Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sLlAsC4I5r.dll

Overview

General Information

Sample name:sLlAsC4I5r.dll
renamed because original name is a hash value
Original sample name:c04e6ce0dafa8fd0c005f90f997083d1.dll
Analysis ID:1591379
MD5:c04e6ce0dafa8fd0c005f90f997083d1
SHA1:3a490c08092a8e5b7ddaff52a30a64d5e873b9f3
SHA256:114cb2b71e51f0a881dd301a9be2af57c5c4cf50ee59c1c19274b85c7be8b0f8
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7424 cmdline: loaddll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7476 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7500 cmdline: rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7484 cmdline: rundll32.exe C:\Users\user\Desktop\sLlAsC4I5r.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 7532 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 7FB008D5D5B7287BE887984844A4AC41)
    • rundll32.exe (PID: 7716 cmdline: rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 7732 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 7FB008D5D5B7287BE887984844A4AC41)
  • mssecsvr.exe (PID: 7648 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: 7FB008D5D5B7287BE887984844A4AC41)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sLlAsC4I5r.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    sLlAsC4I5r.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x353d0:$x3: tasksche.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000009.00000002.1378591463.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000000.1336491510.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000009.00000000.1365489627.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 6 entries
              SourceRuleDescriptionAuthorStrings
              7.2.mssecsvr.exe.226e8c8.6.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              7.2.mssecsvr.exe.1d4a084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              7.2.mssecsvr.exe.1d4a084.5.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                7.2.mssecsvr.exe.1d4a084.5.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x3136c:$x3: tasksche.exe
                • 0x31344:$x8: C:\%s\qeriuwjhrf
                • 0x17338:$s1: C:\%s\%s
                • 0x31358:$s1: C:\%s\%s
                • 0x2e68c:$s5: \\192.168.56.20\IPC$
                • 0x1ba81:$s6: \\172.16.99.5\IPC$
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                7.2.mssecsvr.exe.1d4a084.5.unpackWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
                • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
                • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
                • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
                • 0x1d439:$s1: __TREEID__PLACEHOLDER__
                • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
                • 0x1f508:$s1: __TREEID__PLACEHOLDER__
                • 0x20570:$s1: __TREEID__PLACEHOLDER__
                • 0x215d8:$s1: __TREEID__PLACEHOLDER__
                • 0x22640:$s1: __TREEID__PLACEHOLDER__
                • 0x236a8:$s1: __TREEID__PLACEHOLDER__
                • 0x24710:$s1: __TREEID__PLACEHOLDER__
                • 0x25778:$s1: __TREEID__PLACEHOLDER__
                • 0x267e0:$s1: __TREEID__PLACEHOLDER__
                • 0x27848:$s1: __TREEID__PLACEHOLDER__
                • 0x288b0:$s1: __TREEID__PLACEHOLDER__
                • 0x29918:$s1: __TREEID__PLACEHOLDER__
                • 0x2a980:$s1: __TREEID__PLACEHOLDER__
                • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
                • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
                • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
                • 0x2e340:$s1: __TREEID__PLACEHOLDER__
                Click to see the 35 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T23:01:22.671123+010028033043Unknown Traffic192.168.2.749705103.224.212.21580TCP
                2025-01-14T23:01:25.242495+010028033043Unknown Traffic192.168.2.749713103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T23:01:21.914965+010028300181A Network Trojan was detected192.168.2.7551231.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: sLlAsC4I5r.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c2Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f19bAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f1Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/SAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b4Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/rAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b467Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c202Avira URL Cloud: Label: malware
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 79%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 79%
                Source: sLlAsC4I5r.dllVirustotal: Detection: 94%Perma Link
                Source: sLlAsC4I5r.dllReversingLabs: Detection: 90%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: sLlAsC4I5r.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: sLlAsC4I5r.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.7:55123 -> 1.1.1.1:53
                Source: unknownNetwork traffic detected: IP country count 11
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-22d6-8491-861bb1f7c202 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736892082.2055222
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-2581-9013-e164d1a0f19b HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-251a-92a0-3fc33577b467 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=da1960cc-605f-446a-be7b-4e08db166a04
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49705 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49713 -> 103.224.212.215:80
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.54
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.54
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.54
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.54
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.1
                Source: unknownTCP traffic detected without corresponding DNS query: 141.193.184.1
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.235
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.235
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.235
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.235
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.232.202.1
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.81
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.81
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.81
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.1
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.81
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.1
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.1
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.1
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.1
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.1
                Source: unknownTCP traffic detected without corresponding DNS query: 79.169.8.1
                Source: unknownTCP traffic detected without corresponding DNS query: 207.147.9.74
                Source: unknownTCP traffic detected without corresponding DNS query: 207.147.9.74
                Source: unknownTCP traffic detected without corresponding DNS query: 207.147.9.74
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-22d6-8491-861bb1f7c202 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736892082.2055222
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-2581-9013-e164d1a0f19b HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0901-251a-92a0-3fc33577b467 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=da1960cc-605f-446a-be7b-4e08db166a04
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000006.00000002.1377577741.0000000000A67000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2
                Source: mssecsvr.exe, 00000006.00000002.1377577741.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1377577741.0000000000A50000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1377577741.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c2
                Source: mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000003.1377483851.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1379157550.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b4
                Source: mssecsvr.exe, 00000007.00000002.2014635150.0000000000B8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f1
                Source: mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/S
                Source: mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/r
                Source: sLlAsC4I5r.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com#
                Source: mssecsvr.exe, 00000006.00000002.1377577741.0000000000A50000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1377577741.0000000000A0E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1379157550.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2
                Source: mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22
                Source: mssecsvr.exe, 00000009.00000002.1379157550.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/6L
                Source: mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/B
                Source: mssecsvr.exe, 00000006.00000002.1377577741.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/L
                Source: mssecsvr.exe, 00000007.00000002.2014062047.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comr
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: sLlAsC4I5r.dll, type: SAMPLE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d4a084.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.227d948.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.226e8c8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d59104.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.227d948.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d59104.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d550a4.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.22798e8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1378591463.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1336491510.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000000.1365489627.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.1357140442.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2015410106.000000000227D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2015123751.0000000001D59000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7532, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7648, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7732, type: MEMORYSTR

                System Summary

                barindex
                Source: sLlAsC4I5r.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.226e8c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d4a084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d4a084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d4a084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.227d948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.227d948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.226e8c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.226e8c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.1d59104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d59104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.227d948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d59104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d550a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.22798e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: tasksche.exe.6.drStatic PE information: No import functions for PE file found
                Source: sLlAsC4I5r.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: sLlAsC4I5r.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.226e8c8.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d4a084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d4a084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d4a084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.227d948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.227d948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.226e8c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.226e8c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.1d59104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d59104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.227d948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d59104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d550a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.22798e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: tasksche.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: tasksche.exe.6.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                Source: tasksche.exe.6.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                Source: tasksche.exe.6.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Diagnosis
                Source: tasksche.exe.6.drBinary string: ]\Device\HarddiskVolume2\Windows\System32\winevt\Logs\Microsoft-Windows-NCSI%4Operational.evtxp
                Source: sLlAsC4I5r.dllBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\usbohci.sys
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\ega.cpiKF
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\localspl.dll
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\sensrsvc.dll
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume2\Windows\System32\ru-RU\WinSATAPI.dll.mui
                Source: tasksche.exe.6.drBinary string: b\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\dmvsc.sysT
                Source: tasksche.exe.6.drBinary string: Z\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe#
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\powercfg.exep
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\fveui.dll
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume2\Windows\Prefetch\CONHOST.EXE-1F3E9D7E.pf\p
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\wercplsupport.dll
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Locationp
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\GAGP30KX.SYS
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\QAGENTRT.DLL
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\inf\netmscli.PNFC
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume2\Windows\inf\netip6.PNF
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume2\Windows\ehome\ehrecvr.exe
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\SCardSvr.dll
                Source: sLlAsC4I5r.dllBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\umpass.sysdd
                Source: tasksche.exe.6.drBinary string: V\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\NV_AGP.SYS
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\Prefetch\VPROT.EXE-D7ED8096.pf [
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\acpipmi.sysH
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\VMBusHID.sys&
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABCO
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\amdsbs.sys\S
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16rp
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\volsnap.inf_loc
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\BrSerId.sys
                Source: sLlAsC4I5r.dllBinary string: +\Device\HarddiskVolume2\Windows\System32\ru_PTC
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\crcdisk.sys?
                Source: tasksche.exe.6.drBinary string: [\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Windows Filtering Platform
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\keyboard.inf_loc
                Source: sLlAsC4I5r.dllBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\net
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\mskssrv.sys
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\MTConfig.sys
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\timedate.cplp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\adpu320.sysH;
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Shell
                Source: tasksche.exe.6.drBinary string: t\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\dmvsc.sys@
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\umrdp.dllSTRP
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\sppsvc.exer
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume2\Windows\inf\mshdc.PNFp
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netip6.inf_locp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\FXSSVC.exe
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sfloppy.sysR_
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\dxgkrnl.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\megasas.sys
                Source: sLlAsC4I5r.dllBinary string: r\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CRLsCPU1
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\ULIAGPKX.SYS
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\ru-RU\runonce.exe.mui+
                Source: tasksche.exe.6.drBinary string: \Device\Harddisk0\DR0p
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\ndiscap.PNF
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\bthserv.dll
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\amdk8.syslump
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\nvraid.sys=\(
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft$Hp
                Source: sLlAsC4I5r.dllBinary string: 0\Device\HarddiskVolume2\Windows\System32\vds.exeH
                Source: tasksche.exe.6.drBinary string: j\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgsched.log.lock
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\intelide.sys
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\tdtcp.sys|$P@
                Source: sLlAsC4I5r.dllBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\TsUsbGD.sys
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\shredlog.cfgp
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\Windows\System32\appidpolicyconverter.exe
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\Apphlpdm.dllp
                Source: tasksche.exe.6.drBinary string: H\Device\HarddiskVolume2\Windows\System32\SystemPropertiesPerformance.exe
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\tapisrv.dllID
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\SISAGP.SYS3
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\krnlapi.cfgp
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\rdpdr.sysGtn
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\VIAAGP.SYS.
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\errdev.sys1
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\flpydisk.sys
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\gptext.dll
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\ListSvc.dll
                Source: tasksche.exe.6.drBinary string: ~\Device\HarddiskVolume2\ProgramData\Microsoft\Windows\Caches\{7CD55808-3D38-4DD5-90C9-62F0E6EE60D4}.2.ver0x0000000000000001.db
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\wcncsvc.dll^/
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\ProgramData\Microsoft\RAC\StateData\RacDatabase.sdf
                Source: tasksche.exe.6.drBinary string: U\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\fdeploy.dllW
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netserv.inf_locLNKD
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\vhdmp.sys
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume2\Program Files\AVG\UiDll\2623\icudtl.datp
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\mshidkmdf.sysDC2
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\PeerDistSvc.dll/
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\amdide.sysp
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume2\Windows\Prefetch\SVCHOST.EXE-80F4A784.pfMp
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\AppIDp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\drmkaud.sysCP
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\errdev.sys
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\inf\nettcpip.PNFS
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\inf\netavpnt.PNF
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\MegaSR.sysDC2
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\usbohci.sys3
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\drmkaud.sys
                Source: tasksche.exe.6.drBinary string: [\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatformU3
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\WsmSvc.dll
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\ehome\ehprivjob.exe
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\csllog.cfgLL
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\ql40xx.sys
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\lsi_scsi.sys
                Source: tasksche.exe.6.drBinary string: m\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\Myp
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\wbem\WmiApSrv.exe
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\fsdepends.sysd0`p
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\evbdx.sys
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\certprop.dll
                Source: tasksche.exe.6.drBinary string: p\Device\HarddiskVolume2\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\NV_AGP.SYS\S
                Source: tasksche.exe.6.drBinary string: W\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netrass.inf_loc
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume2\Windows\inf\input.PNFp
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\hidir.sysalH
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\w32time.dllBU
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\sisraid2.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\ru-RU\duser.dll.muiIOp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\ssdpsrv.dllTD
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\nvstor.sys2\
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\rasauto.dll_S
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume2\Windows\inf\oem10.PNFp
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume2\Program Files\Remote Access Host\RemoteSoundServ.exei
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\battery.inf_loc
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\MultimediaR_CPp
                Source: tasksche.exe.6.drBinary string: +\Device\HarddiskVolume2\Windows\System32\ru1
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netsstpt.inf_locBFFRp
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\parvdm.sys1
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16\temp\avg-2c059045-004a-4137-b301-6c3064f40275.tmpp
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\hcw85cir.sys
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\Tasks\WPD\$
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\bdesvc.dll^BN
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\PLA\System
                Source: sLlAsC4I5r.dllBinary string: +\Device\HarddiskVolume2\Windows\System32\en_CPU
                Source: tasksche.exe.6.drBinary string: O\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
                Source: tasksche.exe.6.drBinary string: +\Device\HarddiskVolume2\ProgramData\Avg\log
                Source: tasksche.exe.6.drBinary string: {\Device\HarddiskVolume2\Windows\Performance\WinSAT\DataStore\2016-02-02 17.08.06.946 Formal.Assessment (Initial).WinSAT.xml
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16\temp\avg-2c059045-004a-4137-b301-6c3064f40275.tmpb
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Ras
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\ipnat.sys
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume2\Windows\inf\rspndr.PNFQ0pIRp
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\Globalization\Sortingp
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\drivers\mpio.sys
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\iirsp.sys
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\cpu.inf_locCC
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume2\Windows\Globalization
                Source: tasksche.exe.6.drBinary string: u\Device\HarddiskVolume2\Windows\System32\winevt\Logs\Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtxp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\ndiscap.sysS,
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\Resources\Themes\Aero
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\circlass.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\lsi_sas.sysM
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\ehome\ehrec.exe
                Source: tasksche.exe.6.drBinary string: Y\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16\temp
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\lsi_sas2.sys
                Source: tasksche.exe.6.drBinary string: i\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume2\Windows\Prefetch\DLLHOST.EXE-766398D2.pf_Tp
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume2\Windows\System32\WinSATAPI.dllp
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\iscsiexe.dll
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\nslog.cfgS
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\tdpipe.sys
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\msdsm.sysS1
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\wuaueng.dll
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\1394ohci.sys
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows Defender
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\inf\netsstpt.PNFwnp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\lsi_sas.sys
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\termsrv.dll
                Source: tasksche.exe.6.drBinary string: H\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\mshdc.inf_loc
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrUsbSer.sys
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\filetrace.sysp}
                Source: sLlAsC4I5r.dllBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\WUDFRd.sys
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\wersvc.dllTV
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16\temp\avg-7e9df016-cbcc-4646-838e-02461299762d.tmp
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\irenum.sys
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\wscsvc.dllLNKD
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\ipfltdrv.sys
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\publog.cfgk
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\ehome\mcupdate.exe
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_ru-ru_a13dea73a92ad990\comctl32.dll.muiME
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\schedlog.cfgp
                Source: tasksche.exe.6.drBinary string: ;\Device\Hardd
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\KMSVC.DLLVID3PP
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\gpprnext.dll
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\adpahci.sys
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\ndisuio.PNFT`
                Source: tasksche.exe.6.drBinary string: h\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgemc.log.lockA
                Source: tasksche.exe.6.drBinary string: q\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Contentp
                Source: tasksche.exe.6.drBinary string: -\Device\HarddiskVolume2\Windows\inf\netnb.PNFp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\dxgkrnl.sysT
                Source: tasksche.exe.6.drBinary string: m\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\ndisuio.inf_loc
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\wbengine.exe&
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\b57nd60x.sysp
                Source: tasksche.exe.6.drBinary string: 7\Device\HarddiskVolume2\Program Files\AVG\Av\avg_ru.lng>"
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\MUI
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume2\Windows\inf\wfplwf.PNF
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\$Extend
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\nfrd960.sys
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\WebClnt.dllG
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume2\Windows\Temp\avg-3778490c-65ff-4631-9fd1-8f2e97842712.tmp
                Source: sLlAsC4I5r.dllBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\vhdmp.sysskV
                Source: sLlAsC4I5r.dllBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\viac7.sys\\._PR
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\fdPHost.dll
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\bthmodem.sys
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\RemoteAssistance(
                Source: sLlAsC4I5r.dllBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\VIAAGP.SYSi\
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\HpSAMD.sys01CP
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\hidbth.sys$H
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\gpprefcl.dll
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\megasas.sysPD
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\evbdx.sysC
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\wpcsvc.dll
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\emclog.cfgH
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\stexstor.sys
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\drivers\udfs.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\vsmraid.sysp
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\rasmans.dll
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\adp94xx.sys
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\usbmon.dll
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\netrasa.PNFMPARp
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netnwifi.inf_locPCF
                Source: sLlAsC4I5r.dllBinary string: r\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs1
                Source: tasksche.exe.6.drBinary string: X\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Windows Error ReportingPU
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\sermouse.sys
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\vmbus.sysg\M
                Source: tasksche.exe.6.drBinary string: ,\Device\HarddiskVolume2\Windows\inf\disk.PNFH
                Source: tasksche.exe.6.drBinary string: T\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16p
                Source: tasksche.exe.6.drBinary string: E\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\UPnPp
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\msdtc.exe}SDTL
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\aelupsvc.dll
                Source: tasksche.exe.6.drBinary string: F\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Tcpip
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\RACU5
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avg-7167c74e-f403-416d-93ad-1632477e850e.tmpp
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\netrass.PNFRCBAp
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\tssecsrv.sys
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\Windows\System32\Speech\SpeechUX\sapi.cpl
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\modem.sysTEMPb
                Source: tasksche.exe.6.drBinary string: X\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\vms3cap.sysST
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\sbp2port.sys
                Source: tasksche.exe.6.drBinary string: l\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\fmw1\commonpriv.log.lockUF$
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\cmdide.sysLNKH
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\FntCache.dll
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\nvraid.sys
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\msdtckrm.dll
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\elxstor.sysPT
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\Windows\Prefetch\WERFAULT.EXE-E69F695A.pfp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\iaStorV.sys
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\serenum.sysCT
                Source: tasksche.exe.6.drBinary string: O\Device\HarddiskVolume2\ProgramData\Microsoft\RAC\StateData\RacWmiEventData.dat
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16\temp\avg-49fb6b11-545c-406d-a9bb-da1ce541e50e.tmp
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\bxvbdx.sys
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\appmgmts.dll
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\regsvc.dll
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\HdAudio.sys
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\RTSndMgr.cpl
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\mprdim.dll
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\aliide.sysH
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avg-7167c74e-f403-416d-93ad-1632477e850e.tmp`
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\auditcse.dll
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\tbssvc.dllSTE
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\wacompen.sys
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\lltdio.inf_locp
                Source: tasksche.exe.6.drBinary string: 7\Device\HarddiskVolume2\Windows\System32\drivers\wd.sys
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\Fonts\segoeuii.ttfp
                Source: tasksche.exe.6.drBinary string: M\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Task Manager
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\DriverStore\en-USC
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\wecsvc.dll
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\modem.sysCu|
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\TabSvc.dll
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\inf\netpacer.PNF
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume2\Windows\System32\p2pcollab.dllp
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\lsi_scsi.sysp
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\tdh.dllp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\ProgramData\Avg\log\AV16\history.xml
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\ProgramData\Avg\AV\Chjw\avgpsi.db-journal
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\DFDWiz.exe
                Source: tasksche.exe.6.drBinary string: N\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\LocalLow CHPD p
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\netserv.PNFTMP8p
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume2\Windows\ehome\ehsched.exe
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\volsnap.PNFR07
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\sqlceoledb30.dll
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\MobilePC
                Source: tasksche.exe.6.drBinary string: @\Device\HarddiskVolume2\Program Files\Windows Defender\MpSvc.dll
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\rasacd.sys
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\Windows\Prefetch\TASKHOST.EXE-7238F31D.pf
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\qwavedrv.sys
                Source: tasksche.exe.6.drBinary string: E\Device\HarddiskVolume2\Windows\System32\drivers\rdpvideominiport.sys
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\ProgramData\Avg\AV\Chjw\avgpsi.db-journalp
                Source: sLlAsC4I5r.dllBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\VMBusHID.sys
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\hidserv.PNF
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\drivers\arc.sys
                Source: tasksche.exe.6.drBinary string: S\Device\HarddiskVolume2\$Recycle.Bin\S-1-5-21-1870734524-1274666089-2119431859-1000
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\usbuhci.sys
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\asyncmac.sys
                Source: sLlAsC4I5r.dllBinary string: N\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netvwififlt.inf_locCPU1AP
                Source: sLlAsC4I5r.dllBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\wmiacpi.sys
                Source: tasksche.exe.6.drBinary string: c\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgemc.log
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\SessEnv.dllB_p
                Source: tasksche.exe.6.drBinary string: N\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\SystemRestore
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\mshidkmdf.sysA
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: #\Device\HarddiskVolume2\Windows\infS
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\mrxdav.sysD
                Source: tasksche.exe.6.drBinary string: q\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrSerWdm.sys
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\pnrpsvc.dllO
                Source: tasksche.exe.6.drBinary string: z\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\AxInstSv.dll
                Source: sLlAsC4I5r.dllBinary string: >\Device\HarddiskVolume2\Windows\servicing\TrustedInstaller.exeAP7PDC
                Source: tasksche.exe.6.drBinary string: k\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
                Source: sLlAsC4I5r.dllBinary string: 5\Device\HarddiskVolume2\Windows\System32\wbengine.exe
                Source: sLlAsC4I5r.dllBinary string: 2\Device\HarddiskVolume2\Windows\System32\VSSVC.exeSU
                Source: tasksche.exe.6.drBinary string: h\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgidpdrv.log.2H
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume2\Windows\System32\pots.dllp
                Source: tasksche.exe.6.drBinary string: z\Device\HarddiskVolume2\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
                Source: tasksche.exe.6.drBinary string: \\Device\HarddiskVolume2\Windows\System32\ru-RU\microsoft-windows-kernel-power-events.dll.mui
                Source: tasksche.exe.6.drBinary string: L\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Maintenance
                Source: tasksche.exe.6.drBinary string: k\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exeta
                Source: tasksche.exe.6.drBinary string: ]\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Power Efficiency Diagnostics
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\AMDAGP.SYS
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\dot3svc.dllPN
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\rdpdr.sysw
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\UAGP35.SYS0H
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\pnrpauto.dll
                Source: tasksche.exe.6.drBinary string: U\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Time Synchronization
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\gpscript.dll
                Source: tasksche.exe.6.drBinary string: S\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume2\Windows\System32\qmgr.dll
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\scfilter.sys
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\filetrace.sys
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\upnphost.dll
                Source: sLlAsC4I5r.dllBinary string: S\Device\HarddiskVolume2\Program Files\Common Files\AV\avast! Antivirus\userdata.cab0_TS
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume2\Windows\System32\RTCOMX
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\MemoryDiagnostic
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\FDResPub.dll
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\winspool.drvp
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\terminpt.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\hidbatt.sysL
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\IPMIDrv.sysm
                Source: tasksche.exe.6.drBinary string: \Device\HarddiskVolume2\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_ru-ru_a13dea73a92ad990
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume2\Windows\System32\defragsvc.dll
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\lpremove.exep
                Source: tasksche.exe.6.drBinary string: i\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\fmw1\avgmsgdisp.log.2
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\viaide.systo
                Source: tasksche.exe.6.drBinary string: i\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\fmw1\avgmsgdisp.log.3
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\hidbth.sys<\
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume2\Windows\System32\IPBusEnum.dll
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\gatherNetworkInfo.vbs1
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\swprv.dllHM
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\qwave.dllP03HPS
                Source: sLlAsC4I5r.dllBinary string: P\Device\HarddiskVolume2\Program Files\Common Files\AV\AVG AntiVirus Free EditionU4
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\FXSMON.dll
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\djsvs.sysD
                Source: tasksche.exe.6.drBinary string: h\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgidpdrv.log.3
                Source: sLlAsC4I5r.dllBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\vmbus.sys
                Source: tasksche.exe.6.drBinary string: S\Device\HarddiskVolume3\$RECYCLE.BIN\S-1-5-21-1870734524-1274666089-2119431859-1000H
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\msdsm.sysA\_^
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\sppuinotify.dll
                Source: tasksche.exe.6.drBinary string: l\Device\HarddiskVolume2\Users\
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume2\Windows\System32\msra.exe
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\vms3cap.sys
                Source: sLlAsC4I5r.dllBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\viaide.sys
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\HpSAMD.sys
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\ru-RU\rascfg.dll.mui
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\amdsata.syso
                Source: tasksche.exe.6.drBinary string: e\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgshred.logp
                Source: tasksche.exe.6.drBinary string: U\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\User Profile Service
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\isapnp.sys
                Source: tasksche.exe.6.drBinary string: H\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Autochk
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrUsbMdm.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\IPMIDrv.sys
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\Mcx2Svc.dll
                Source: tasksche.exe.6.drBinary string: V\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\TextServicesFrameworkDR
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\inf\netnwifi.PNF
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\mspqm.syst
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\ru-RU\racengn.dll.muiH
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\dskquota.dll
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\DefragRe
                Source: tasksche.exe.6.drBinary string: Q\Device\HarddiskVolume2\Windows\System32\TsUsbRedirectionGroupPolicyExtension.dll
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\AGP440.sys;
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\hidserv.inf_locp}
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\wersvc.dll
                Source: tasksche.exe.6.drBinary string: 7\Device\HarddiskVolume2\Windows\System32\dot3gpclnt.dll
                Source: sLlAsC4I5r.dllBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\ws2ifsl.sys._
                Source: tasksche.exe.6.drBinary string: N\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netvwififlt.inf_loc
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\wimmount.sys
                Source: tasksche.exe.6.drBinary string: ?\Device\HarddiskVolume2\Windows\System32\drivers\Synth3dVsc.sys
                Source: tasksche.exe.6.drBinary string: r\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs:
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\netrast.PNFp
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\usbport.inf_locD5
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\Defrag.exe
                Source: sLlAsC4I5r.dllBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\vsmraid.sys
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\System32\drivers\fsdepends.sysSB_PADp
                Source: sLlAsC4I5r.dllBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\tdtcp.sys
                Source: tasksche.exe.6.drBinary string: A\Device\HarddiskVolume2\Windows\Prefetch\AVGUIRNX.EXE-006CD133.pfp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\tcpmon.dll
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\inf\netvwififlt.PNFF4
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sffdisk.sys0
                Source: sLlAsC4I5r.dllBinary string: Y\Device\HarddiskVolume2\Windows\System32\Macromed\Flash\FlashUtil32_25_0_0_148_pepper.exe
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\mstee.sysP
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\appidsvc.dll
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Bluetoothp
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\p2psvc.dll
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\machine.inf_loc3
                Source: tasksche.exe.6.drBinary string: D\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\PLA_S
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume2\Windows\System32\drivers\cdfs.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\USBSTOR.SYS
                Source: sLlAsC4I5r.dllBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\usbuhci.sysS
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\SyncCenter;PBI
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\drivers\mstee.sys
                Source: tasksche.exe.6.drBinary string: I\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\NetTrace
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\runonce.exe
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\seclogon.dll
                Source: tasksche.exe.6.drBinary string: 1\Device\HarddiskVolume2\ProgramData\Avg\AV\cfgall
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\storvsc.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sfloppy.sysH
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\serial.sys
                Source: sLlAsC4I5r.dllBinary string: 2\Device\HarddiskVolume2\Windows\System32\fveui.dllPR_CPU
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\display.inf_loc DDL3 p
                Source: tasksche.exe.6.drBinary string: e\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgsched.logh
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\vds.exe
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\PerfTrackYS
                Source: tasksche.exe.6.drBinary string: 2\Device\HarddiskVolume2\Windows\System32\VSSVC.exe
                Source: tasksche.exe.6.drBinary string: r\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaDataI
                Source: tasksche.exe.6.drBinary string: h\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgpal.log.lock
                Source: sLlAsC4I5r.dllBinary string: T\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\av16
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\alg.exe_
                Source: tasksche.exe.6.drBinary string: S\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\WindowsColorSystemH
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\RacRules.xml
                Source: tasksche.exe.6.drBinary string: S\Device\HarddiskVolume2\ProgramData\Microsoft\RAC\StateData\RacWmiDataBookmarks.dat
                Source: tasksche.exe.6.drBinary string: 8\Device\HarddiskVolume2\Windows\System32\drivers\fdc.sys
                Source: tasksche.exe.6.drBinary string: :\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RUrdd
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\ru-RU\mprmsg.dll.muip
                Source: tasksche.exe.6.drBinary string: 9\Device\HarddiskVolume2\Program Files\AVG\Av\avgmfapx.exe
                Source: tasksche.exe.6.drBinary string: V\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Windows Media Sharing
                Source: sLlAsC4I5r.dllBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\SISAGP.SYSU0CS
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume2\ProgramData\Avg\AV\DB\stats.db\/
                Source: tasksche.exe.6.drBinary string: W\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\Application Experience'B
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\nettcpip.inf_loc
                Source: tasksche.exe.6.drBinary string: >\Device\HarddiskVolume2\Windows\servicing\TrustedInstaller.exe
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sffp_sd.sysU6
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\BrFiltUp.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\elxstor.sys
                Source: tasksche.exe.6.drBinary string: j\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgshred.log.lockNOT
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\processr.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\iaStorV.sysX[
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\wmiacpi.sys@A
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\ql40xx.sys\
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\pciide.sys
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netmscli.inf_loc
                Source: sLlAsC4I5r.dllBinary string: 3\Device\HarddiskVolume2\Windows\System32\sppsvc.exe
                Source: tasksche.exe.6.drBinary string: /\Device\HarddiskVolume2\Windows\inf\usbport.PNF
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\DriverStoreop
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\ndiscap.inf_loc
                Source: tasksche.exe.6.drBinary string: r\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\nvstor.sysD
                Source: tasksche.exe.6.drBinary string: .\Device\HarddiskVolume2\Windows\inf\lltdio.PNFS
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\lltdsvc.dll
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\WcsPlugInService.dll
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\TsUsbGD.sys$
                Source: tasksche.exe.6.drBinary string: N\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\WindowsBackup$XH
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\sdrsvc.dll
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\arcsas.sys
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\msiscsi.sysH
                Source: tasksche.exe.6.drBinary string: c\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\av16\avgpal.logPS['`
                Source: tasksche.exe.6.drBinary string: 5\Device\HarddiskVolume2\Windows\System32\raserver.exe
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\serenum.sys2
                Source: tasksche.exe.6.drBinary string: 0\Device\HarddiskVolume2\Windows\System32\pla.dll
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\crcdisk.sys
                Source: tasksche.exe.6.drBinary string: X\Device\HarddiskVolume2\Windows\System32\Tasks\Microsoft\Windows\NetworkAccessProtectionPM
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\sffp_sd.syst+
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\cmdide.sys
                Source: tasksche.exe.6.drBinary string: 7\Device\HarddiskVolume2\Program Files\AVG\Av\fixcfg.exes\p
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\parvdm.sys
                Source: tasksche.exe.6.drBinary string: 6\Device\HarddiskVolume2\Windows\System32\bthudtask.exe
                Source: tasksche.exe.6.drBinary string: J\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netrast.inf_loc
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\lsi_fc.sysgr
                Source: tasksche.exe.6.drBinary string: G\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\disk.inf_locD$XHp
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\mskssrv.sysDC
                Source: tasksche.exe.6.drBinary string: 4\Device\HarddiskVolume2\Windows\System32\Locator.exe
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\lsi_fc.sysX
                Source: tasksche.exe.6.drBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\ql2300.sys
                Source: tasksche.exe.6.drBinary string: +\Device\HarddiskVolume2\Windows\System32\enp
                Source: tasksche.exe.6.drBinary string: g\Device\HarddiskVolume2\Windows\System32\config\systemprofile\AppData\Local\Avg\log\fmw1\commonpriv.log
                Source: tasksche.exe.6.drBinary string: j\Device\HarddiskVolume2\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
                Source: sLlAsC4I5r.dllBinary string: ;\Device\HarddiskVolume2\Windows\System32\drivers\tdpipe.sys1APP
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\mspclock.sys
                Source: tasksche.exe.6.drBinary string: K\Device\HarddiskVolume2\Windows\System32\DriverStore\ru-RU\netpacer.inf_locNKA
                Source: tasksche.exe.6.drBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\ndiscap.sys,
                Source: sLlAsC4I5r.dllBinary string: <\Device\HarddiskVolume2\Windows\System32\drivers\USBSTOR.SYSW
                Source: tasksche.exe.6.drBinary string: =\Device\HarddiskVolume2\Windows\System32\drivers\sffp_mmc.sys
                Source: tasksche.exe.6.drBinary string: 3\Device\HarddiskVolume2\Windows\System32\wermgr.exeP80D
                Source: loaddll32.exe, 00000000.00000002.1366389403.0000000000EDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CMD;.VBS;.VBP
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7432:120:WilError_03
                Source: sLlAsC4I5r.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\sLlAsC4I5r.dll,PlayGame
                Source: sLlAsC4I5r.dllVirustotal: Detection: 94%
                Source: sLlAsC4I5r.dllReversingLabs: Detection: 90%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\sLlAsC4I5r.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\sLlAsC4I5r.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: sLlAsC4I5r.dllStatic file information: File size 5267459 > 1048576
                Source: sLlAsC4I5r.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: tasksche.exe.6.drStatic PE information: section name: .text entropy: 7.59119556320733

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exe TID: 7776Thread sleep count: 93 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7776Thread sleep time: -186000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7780Thread sleep count: 129 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7780Thread sleep count: 50 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7776Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvr.exe, 00000006.00000002.1377577741.0000000000A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP2
                Source: mssecsvr.exe, 00000006.00000002.1377577741.0000000000A67000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2014635150.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1379157550.0000000000A40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvr.exe, 00000009.00000002.1379157550.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1Jump to behavior
                Source: mssecsvr.exe, 00000006.00000002.1377366936.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvr.exe, 00000007.00000002.2014362748.0000000000710000.00000002.00000001.01000000.00000004.sdmp, mssecsvr.exe, 00000007.00000002.2015410106.000000000227D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2015123751.0000000001D59000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000000.1365580183.0000000000710000.00000002.00000001.01000000.00000004.sdmp, tasksche.exe.6.drBinary or memory string: 2\Device\HarddiskVolume2\Windows\ehome\mcupdate.exe
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591379 Sample: sLlAsC4I5r.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 34 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->34 36 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 77026.bodis.com 2->38 46 Suricata IDS alerts for network traffic 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for URL or domain 2->50 52 7 other signatures 2->52 8 loaddll32.exe 1 2->8         started        10 mssecsvr.exe 12 2->10         started        signatures3 process4 dnsIp5 14 rundll32.exe 8->14         started        17 rundll32.exe 8->17         started        19 cmd.exe 1 8->19         started        21 conhost.exe 8->21         started        40 192.168.2.102 unknown unknown 10->40 42 192.168.2.103 unknown unknown 10->42 44 98 other IPs or domains 10->44 54 Connects to many different private IPs via SMB (likely to spread or exploit) 10->54 56 Connects to many different private IPs (likely to spread or exploit) 10->56 signatures6 process7 signatures8 58 Drops executables to the windows directory (C:\Windows) and starts them 14->58 23 mssecsvr.exe 13 14->23         started        26 mssecsvr.exe 13 17->26         started        28 rundll32.exe 1 19->28         started        process9 file10 30 C:\WINDOWS\qeriuwjhrf (copy), PE32 23->30 dropped 32 C:\Windows\tasksche.exe, PE32 26->32 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                sLlAsC4I5r.dll94%VirustotalBrowse
                sLlAsC4I5r.dll90%ReversingLabsWin32.Ransomware.WannaCry
                sLlAsC4I5r.dll100%AviraTR/AD.DPulsarShellcode.gohtr
                sLlAsC4I5r.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)79%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe79%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c2100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f19b100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f1100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comr0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/S100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b4100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/r100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b467100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c202100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    high
                    ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f19bfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                        high
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b467false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c202false
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Lmssecsvr.exe, 00000006.00000002.1377577741.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c2mssecsvr.exe, 00000006.00000002.1377577741.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1377577741.0000000000A50000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1377577741.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000006.00000002.1377577741.0000000000A67000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comsLlAsC4I5r.dllfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f1mssecsvr.exe, 00000007.00000002.2014635150.0000000000B8B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Bmssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comrmssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Smssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/rmssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b4mssecsvr.exe, 00000009.00000002.1379157550.0000000000A21000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000003.1377483851.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.1379157550.00000000009E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000007.00000002.2014062047.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/6Lmssecsvr.exe, 00000009.00000002.1379157550.00000000009E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com#mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2mssecsvr.exe, 00000007.00000002.2014635150.0000000000B68000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        63.48.67.31
                                        unknownUnited States
                                        701UUNETUSfalse
                                        126.112.145.183
                                        unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                                        109.143.164.166
                                        unknownBelgium
                                        5432PROXIMUS-ISP-ASBEfalse
                                        58.100.254.22
                                        unknownChina
                                        24139WASUHZHuashumediaNetworkLimitedCNfalse
                                        152.147.57.1
                                        unknownAustralia
                                        6400CompaniaDominicanadeTelefonosSADOfalse
                                        132.251.70.33
                                        unknownPeru
                                        21575ENTELPERUSAPEfalse
                                        130.184.107.1
                                        unknownUnited States
                                        10508UARK-FAYETTEVILLEUSfalse
                                        182.19.215.1
                                        unknownSingapore
                                        55430STARHUB-NGNBNStarhubLtdSGfalse
                                        140.192.249.69
                                        unknownUnited States
                                        20130DEPAULUSfalse
                                        109.143.164.1
                                        unknownBelgium
                                        5432PROXIMUS-ISP-ASBEfalse
                                        79.169.8.2
                                        unknownPortugal
                                        2860NOS_COMUNICACOESPTfalse
                                        79.169.8.1
                                        unknownPortugal
                                        2860NOS_COMUNICACOESPTfalse
                                        39.80.197.203
                                        unknownChina
                                        4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                        130.184.107.238
                                        unknownUnited States
                                        10508UARK-FAYETTEVILLEUSfalse
                                        141.193.184.54
                                        unknownUnited States
                                        53292MWAYUSfalse
                                        67.118.253.243
                                        unknownUnited States
                                        11191F2W-ASUSfalse
                                        99.232.202.235
                                        unknownCanada
                                        812ROGERS-COMMUNICATIONSCAfalse
                                        219.56.238.1
                                        unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                                        59.130.120.1
                                        unknownJapan2516KDDIKDDICORPORATIONJPfalse
                                        59.130.120.2
                                        unknownJapan2516KDDIKDDICORPORATIONJPfalse
                                        148.67.37.1
                                        unknownJapan9605DOCOMONTTDOCOMOINCJPfalse
                                        102.252.16.166
                                        unknownSouth Africa
                                        5713SAIX-NETZAfalse
                                        IP
                                        192.168.2.148
                                        192.168.2.149
                                        192.168.2.146
                                        192.168.2.147
                                        192.168.2.140
                                        192.168.2.141
                                        192.168.2.144
                                        192.168.2.145
                                        192.168.2.142
                                        192.168.2.143
                                        192.168.2.159
                                        192.168.2.157
                                        192.168.2.158
                                        192.168.2.151
                                        192.168.2.152
                                        192.168.2.150
                                        192.168.2.155
                                        192.168.2.156
                                        192.168.2.153
                                        192.168.2.154
                                        192.168.2.126
                                        192.168.2.247
                                        192.168.2.127
                                        192.168.2.248
                                        192.168.2.124
                                        192.168.2.245
                                        192.168.2.125
                                        192.168.2.246
                                        192.168.2.128
                                        192.168.2.249
                                        192.168.2.129
                                        192.168.2.240
                                        192.168.2.122
                                        192.168.2.243
                                        192.168.2.123
                                        192.168.2.244
                                        192.168.2.120
                                        192.168.2.241
                                        192.168.2.121
                                        192.168.2.242
                                        192.168.2.97
                                        192.168.2.137
                                        192.168.2.96
                                        192.168.2.138
                                        192.168.2.99
                                        192.168.2.135
                                        192.168.2.98
                                        192.168.2.136
                                        192.168.2.139
                                        192.168.2.250
                                        192.168.2.130
                                        192.168.2.251
                                        192.168.2.91
                                        192.168.2.90
                                        192.168.2.93
                                        192.168.2.133
                                        192.168.2.254
                                        192.168.2.92
                                        192.168.2.134
                                        192.168.2.95
                                        192.168.2.131
                                        192.168.2.252
                                        192.168.2.94
                                        192.168.2.132
                                        192.168.2.253
                                        192.168.2.104
                                        192.168.2.225
                                        192.168.2.105
                                        192.168.2.226
                                        192.168.2.102
                                        192.168.2.223
                                        192.168.2.103
                                        192.168.2.224
                                        192.168.2.108
                                        192.168.2.229
                                        192.168.2.109
                                        192.168.2.106
                                        192.168.2.227
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1591379
                                        Start date and time:2025-01-14 23:00:17 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 4m 44s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:13
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:sLlAsC4I5r.dll
                                        renamed because original name is a hash value
                                        Original Sample Name:c04e6ce0dafa8fd0c005f90f997083d1.dll
                                        Detection:MAL
                                        Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:Failed
                                        Cookbook Comments:
                                        • Found application associated with file extension: .dll
                                        • Stop behavior analysis, all processes terminated
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                        • Excluded IPs from analysis (whitelisted): 199.232.210.172, 13.107.246.45, 4.245.163.56
                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        17:01:23API Interceptor1x Sleep call for process: loaddll32.exe modified
                                        17:01:59API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        77026.bodis.comhabHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                        • 199.59.243.227
                                        www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comhabHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        LisectAVT_2403002A_327.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        UUNETUShsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                        • 63.93.143.167
                                        5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                                        • 68.135.139.2
                                        MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                        • 158.225.208.1
                                        6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                        • 208.220.165.1
                                        Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                        • 100.58.154.124
                                        ppc.elfGet hashmaliciousUnknownBrowse
                                        • 63.91.99.74
                                        m68k.elfGet hashmaliciousUnknownBrowse
                                        • 65.217.125.113
                                        i686.elfGet hashmaliciousUnknownBrowse
                                        • 149.228.78.158
                                        x86.elfGet hashmaliciousUnknownBrowse
                                        • 141.158.117.223
                                        arm5.elfGet hashmaliciousUnknownBrowse
                                        • 71.191.111.230
                                        PROXIMUS-ISP-ASBEelitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 91.180.223.136
                                        elitebotnet.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 195.95.97.233
                                        5.elfGet hashmaliciousUnknownBrowse
                                        • 178.144.195.45
                                        res.mpsl.elfGet hashmaliciousUnknownBrowse
                                        • 109.139.205.171
                                        frosty.spc.elfGet hashmaliciousMiraiBrowse
                                        • 91.178.113.202
                                        frosty.x86.elfGet hashmaliciousMiraiBrowse
                                        • 91.178.113.245
                                        frosty.sh4.elfGet hashmaliciousMiraiBrowse
                                        • 109.142.52.124
                                        armv5l.elfGet hashmaliciousUnknownBrowse
                                        • 87.65.230.219
                                        Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                        • 81.241.209.204
                                        sora.mips.elfGet hashmaliciousUnknownBrowse
                                        • 109.129.79.181
                                        WASUHZHuashumediaNetworkLimitedCN6.elfGet hashmaliciousUnknownBrowse
                                        • 219.82.255.174
                                        miori.mpsl.elfGet hashmaliciousUnknownBrowse
                                        • 218.108.134.37
                                        momo.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 58.101.152.91
                                        x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 58.101.164.88
                                        armv5l.elfGet hashmaliciousUnknownBrowse
                                        • 58.100.157.67
                                        nklmpsl.elfGet hashmaliciousUnknownBrowse
                                        • 125.210.206.59
                                        loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                        • 219.82.120.197
                                        nshkmips.elfGet hashmaliciousMiraiBrowse
                                        • 218.108.109.69
                                        arm7.nn-20241213-0355.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 218.108.210.197
                                        meerkat.arm.elfGet hashmaliciousMiraiBrowse
                                        • 58.101.176.50
                                        GIGAINFRASoftbankBBCorpJPYZJG8NuHEP.dllGet hashmaliciousWannacryBrowse
                                        • 126.46.181.1
                                        eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                        • 126.147.175.1
                                        sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                        • 126.245.156.111
                                        MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                        • 126.245.102.34
                                        Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                        • 219.174.245.132
                                        meth10.elfGet hashmaliciousMiraiBrowse
                                        • 60.132.41.97
                                        meth3.elfGet hashmaliciousMiraiBrowse
                                        • 219.40.50.142
                                        meth8.elfGet hashmaliciousMiraiBrowse
                                        • 219.206.176.119
                                        arm4.elfGet hashmaliciousUnknownBrowse
                                        • 60.131.121.59
                                        ppc.elfGet hashmaliciousUnknownBrowse
                                        • 126.220.122.94
                                        No context
                                        No context
                                        Process:C:\Windows\mssecsvr.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2061938
                                        Entropy (8bit):7.782759060913005
                                        Encrypted:false
                                        SSDEEP:49152:EMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAW:EPoBhz1aRxcSUDk36SAp
                                        MD5:A72619A92308E5B344215B724D6405F9
                                        SHA1:AF73E64DB5D0DB431C35E7900D07E1A3B5AC44F8
                                        SHA-256:34DC95C4E0FE17326D252CBB0146FD4C10CB5D565C2E4B3998CC39187997CFEF
                                        SHA-512:B8185016742CCBB76A599126F151F4ECD6F537BB5936063A85BDE9C276FE32C23017787B5730E63A9CD9994E71063310FF7D87965A2A4C6A7F5DECD9F61013F4
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 79%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\mssecsvr.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2061938
                                        Entropy (8bit):7.782759060913005
                                        Encrypted:false
                                        SSDEEP:49152:EMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAW:EPoBhz1aRxcSUDk36SAp
                                        MD5:A72619A92308E5B344215B724D6405F9
                                        SHA1:AF73E64DB5D0DB431C35E7900D07E1A3B5AC44F8
                                        SHA-256:34DC95C4E0FE17326D252CBB0146FD4C10CB5D565C2E4B3998CC39187997CFEF
                                        SHA-512:B8185016742CCBB76A599126F151F4ECD6F537BB5936063A85BDE9C276FE32C23017787B5730E63A9CD9994E71063310FF7D87965A2A4C6A7F5DECD9F61013F4
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 79%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):4.104093182393967
                                        TrID:
                                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                        • DOS Executable Generic (2002/1) 0.20%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:sLlAsC4I5r.dll
                                        File size:5'267'459 bytes
                                        MD5:c04e6ce0dafa8fd0c005f90f997083d1
                                        SHA1:3a490c08092a8e5b7ddaff52a30a64d5e873b9f3
                                        SHA256:114cb2b71e51f0a881dd301a9be2af57c5c4cf50ee59c1c19274b85c7be8b0f8
                                        SHA512:cf32e15c4f0e706bae9c619b2e106aa5b7e3a85c9643c89a23d47ac94bfe03417cc16d89b53f3e5e6b858df31aaeb9d8bfc5fa6eb09838f25b69ec7dd46b9363
                                        SSDEEP:49152:RnGMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:1GPoBhz1aRxcSUDk36SA
                                        TLSH:6936F115A1E82B64E7F36FB2217B871047797E45889B925E1760A04F0C33F5CDEA2F29
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                        Icon Hash:7ae282899bbab082
                                        Entrypoint:0x100011e9
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x10000000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                        DLL Characteristics:
                                        Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                        Instruction
                                        push ebp
                                        mov ebp, esp
                                        push ebx
                                        mov ebx, dword ptr [ebp+08h]
                                        push esi
                                        mov esi, dword ptr [ebp+0Ch]
                                        push edi
                                        mov edi, dword ptr [ebp+10h]
                                        test esi, esi
                                        jne 00007F20D14212FBh
                                        cmp dword ptr [10003140h], 00000000h
                                        jmp 00007F20D1421318h
                                        cmp esi, 01h
                                        je 00007F20D14212F7h
                                        cmp esi, 02h
                                        jne 00007F20D1421314h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007F20D14212FBh
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        test eax, eax
                                        je 00007F20D14212FEh
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007F20D142120Ah
                                        test eax, eax
                                        jne 00007F20D14212F6h
                                        xor eax, eax
                                        jmp 00007F20D1421340h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007F20D14210BCh
                                        cmp esi, 01h
                                        mov dword ptr [ebp+0Ch], eax
                                        jne 00007F20D14212FEh
                                        test eax, eax
                                        jne 00007F20D1421329h
                                        push edi
                                        push eax
                                        push ebx
                                        call 00007F20D14211E6h
                                        test esi, esi
                                        je 00007F20D14212F7h
                                        cmp esi, 03h
                                        jne 00007F20D1421318h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007F20D14211D5h
                                        test eax, eax
                                        jne 00007F20D14212F5h
                                        and dword ptr [ebp+0Ch], eax
                                        cmp dword ptr [ebp+0Ch], 00000000h
                                        je 00007F20D1421303h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007F20D14212FAh
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        mov dword ptr [ebp+0Ch], eax
                                        mov eax, dword ptr [ebp+0Ch]
                                        pop edi
                                        pop esi
                                        pop ebx
                                        pop ebp
                                        retn 000Ch
                                        jmp dword ptr [10002028h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        Programming Language:
                                        • [ C ] VS98 (6.0) build 8168
                                        • [C++] VS98 (6.0) build 8168
                                        • [RES] VS98 (6.0) cvtres build 1720
                                        • [LNK] VS98 (6.0) imp/exp build 8168
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x40000x5000600x501000f6b95d626b2fe810c21037fbec681b3dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        W0x40600x500000dataEnglishUnited States0.8766069412231445
                                        DLLImport
                                        KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                        MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                        NameOrdinalAddress
                                        PlayGame10x10001114
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-14T23:01:21.914965+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.7551231.1.1.153UDP
                                        2025-01-14T23:01:22.671123+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749705103.224.212.21580TCP
                                        2025-01-14T23:01:25.242495+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749713103.224.212.21580TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 23:01:14.859170914 CET49677443192.168.2.720.50.201.200
                                        Jan 14, 2025 23:01:15.280987978 CET49671443192.168.2.7204.79.197.203
                                        Jan 14, 2025 23:01:15.624711037 CET49677443192.168.2.720.50.201.200
                                        Jan 14, 2025 23:01:15.968588114 CET49674443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:15.968615055 CET49675443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:16.093497992 CET49672443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:17.124769926 CET49677443192.168.2.720.50.201.200
                                        Jan 14, 2025 23:01:20.109385014 CET49677443192.168.2.720.50.201.200
                                        Jan 14, 2025 23:01:22.074084997 CET4970580192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:22.078898907 CET8049705103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:22.078963995 CET4970580192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:22.080096006 CET4970580192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:22.084868908 CET8049705103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:22.671039104 CET8049705103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:22.671123028 CET4970580192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:22.671148062 CET8049705103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:22.671291113 CET4970580192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:22.684258938 CET4970580192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:22.689083099 CET8049705103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:23.016143084 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:23.021944046 CET8049707199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:23.022011042 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:23.022124052 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:23.026859045 CET8049707199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:23.475541115 CET8049707199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:23.475580931 CET8049707199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:23.475601912 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:23.475624084 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:23.577929020 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:23.578496933 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:23.582995892 CET8049707199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:23.583041906 CET4970780192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:24.361234903 CET4971380192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:24.591402054 CET8049713103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:24.591506004 CET4971380192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:24.591661930 CET4971380192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:24.601845980 CET8049713103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:24.705621958 CET4971480192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:24.711014986 CET8049714103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:24.711090088 CET4971480192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:24.711371899 CET4971480192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:24.716274023 CET8049714103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:24.888298988 CET49671443192.168.2.7204.79.197.203
                                        Jan 14, 2025 23:01:25.242415905 CET8049713103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:25.242481947 CET8049713103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:25.242495060 CET4971380192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:25.242549896 CET4971380192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:25.245326996 CET4971380192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:25.246273994 CET4971580192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.250085115 CET8049713103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:25.251077890 CET8049715199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.251307011 CET4971580192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.251307011 CET4971580192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.256133080 CET8049715199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.350713968 CET8049714103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:25.350826025 CET8049714103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:25.350905895 CET4971480192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:25.354090929 CET4971480192.168.2.7103.224.212.215
                                        Jan 14, 2025 23:01:25.355901003 CET4971680192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.358885050 CET8049714103.224.212.215192.168.2.7
                                        Jan 14, 2025 23:01:25.360709906 CET8049716199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.363327980 CET4971680192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.363534927 CET4971680192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.368298054 CET8049716199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.578201056 CET49675443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:25.578278065 CET49674443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:25.703181982 CET49672443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:25.716434956 CET8049715199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.716480970 CET8049715199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.716931105 CET4971580192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.722470045 CET4971580192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.722470045 CET4971580192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.754921913 CET49722445192.168.2.7141.193.184.54
                                        Jan 14, 2025 23:01:25.759814978 CET44549722141.193.184.54192.168.2.7
                                        Jan 14, 2025 23:01:25.760164976 CET49722445192.168.2.7141.193.184.54
                                        Jan 14, 2025 23:01:25.760890007 CET49722445192.168.2.7141.193.184.54
                                        Jan 14, 2025 23:01:25.760890007 CET49723445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:25.765806913 CET44549722141.193.184.54192.168.2.7
                                        Jan 14, 2025 23:01:25.765841961 CET44549723141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:25.766200066 CET49722445192.168.2.7141.193.184.54
                                        Jan 14, 2025 23:01:25.766200066 CET49723445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:25.766285896 CET49723445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:25.771289110 CET44549723141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:25.771373034 CET49723445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:25.772840977 CET49725445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:25.777651072 CET44549725141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:25.777719021 CET49725445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:25.777772903 CET49725445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:25.782596111 CET44549725141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:25.824352026 CET8049716199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.824409008 CET8049716199.59.243.228192.168.2.7
                                        Jan 14, 2025 23:01:25.824419022 CET4971680192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.824557066 CET4971680192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.835041046 CET4971680192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:25.835041046 CET4971680192.168.2.7199.59.243.228
                                        Jan 14, 2025 23:01:26.062571049 CET49677443192.168.2.720.50.201.200
                                        Jan 14, 2025 23:01:27.767133951 CET49759445192.168.2.7198.110.238.81
                                        Jan 14, 2025 23:01:27.771886110 CET44549759198.110.238.81192.168.2.7
                                        Jan 14, 2025 23:01:27.771950960 CET49759445192.168.2.7198.110.238.81
                                        Jan 14, 2025 23:01:27.771990061 CET49759445192.168.2.7198.110.238.81
                                        Jan 14, 2025 23:01:27.772394896 CET49760445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:27.776846886 CET44549759198.110.238.81192.168.2.7
                                        Jan 14, 2025 23:01:27.776890993 CET49759445192.168.2.7198.110.238.81
                                        Jan 14, 2025 23:01:27.777200937 CET44549760198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:27.777254105 CET49760445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:27.777293921 CET49760445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:27.778634071 CET49761445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:27.782269955 CET44549760198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:27.782315969 CET49760445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:27.783499002 CET44549761198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:27.783545017 CET49761445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:27.783585072 CET49761445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:27.788455009 CET44549761198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:28.217452049 CET44349704104.98.116.138192.168.2.7
                                        Jan 14, 2025 23:01:28.217550993 CET49704443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:29.788276911 CET49796445192.168.2.799.232.202.235
                                        Jan 14, 2025 23:01:29.794910908 CET4454979699.232.202.235192.168.2.7
                                        Jan 14, 2025 23:01:29.794996023 CET49796445192.168.2.799.232.202.235
                                        Jan 14, 2025 23:01:29.802278042 CET49796445192.168.2.799.232.202.235
                                        Jan 14, 2025 23:01:29.802599907 CET49798445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:29.809349060 CET4454979899.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:29.809369087 CET4454979699.232.202.235192.168.2.7
                                        Jan 14, 2025 23:01:29.809456110 CET49798445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:29.809475899 CET49796445192.168.2.799.232.202.235
                                        Jan 14, 2025 23:01:29.815954924 CET49798445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:29.818089008 CET49799445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:29.822575092 CET4454979899.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:29.822635889 CET49798445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:29.824737072 CET4454979999.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:29.824800014 CET49799445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:29.824873924 CET49799445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:29.831572056 CET4454979999.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:31.798544884 CET49829445192.168.2.779.169.8.81
                                        Jan 14, 2025 23:01:31.803344011 CET4454982979.169.8.81192.168.2.7
                                        Jan 14, 2025 23:01:31.803437948 CET49829445192.168.2.779.169.8.81
                                        Jan 14, 2025 23:01:31.803492069 CET49829445192.168.2.779.169.8.81
                                        Jan 14, 2025 23:01:31.803697109 CET49830445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:31.808722019 CET4454983079.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:31.808732986 CET4454982979.169.8.81192.168.2.7
                                        Jan 14, 2025 23:01:31.808805943 CET49829445192.168.2.779.169.8.81
                                        Jan 14, 2025 23:01:31.808876991 CET49830445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:31.808876991 CET49830445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:31.809942961 CET49831445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:31.813888073 CET4454983079.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:31.813946962 CET49830445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:31.814872980 CET4454983179.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:31.814989090 CET49831445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:31.815025091 CET49831445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:31.819736004 CET4454983179.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:34.072943926 CET49860445192.168.2.7207.147.9.74
                                        Jan 14, 2025 23:01:34.077831030 CET44549860207.147.9.74192.168.2.7
                                        Jan 14, 2025 23:01:34.077907085 CET49860445192.168.2.7207.147.9.74
                                        Jan 14, 2025 23:01:34.107187033 CET49860445192.168.2.7207.147.9.74
                                        Jan 14, 2025 23:01:34.107217073 CET49861445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:34.112030029 CET44549861207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:34.112040043 CET44549860207.147.9.74192.168.2.7
                                        Jan 14, 2025 23:01:34.112128019 CET49861445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:34.112128019 CET49860445192.168.2.7207.147.9.74
                                        Jan 14, 2025 23:01:34.113881111 CET49861445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:34.118704081 CET44549861207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:34.118765116 CET49861445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:34.231554031 CET49864445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:34.236443043 CET44549864207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:34.236500025 CET49864445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:34.237171888 CET49864445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:34.241930962 CET44549864207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:35.970732927 CET49897445192.168.2.739.80.197.203
                                        Jan 14, 2025 23:01:35.975560904 CET4454989739.80.197.203192.168.2.7
                                        Jan 14, 2025 23:01:35.975687981 CET49897445192.168.2.739.80.197.203
                                        Jan 14, 2025 23:01:35.975687981 CET49897445192.168.2.739.80.197.203
                                        Jan 14, 2025 23:01:35.975965977 CET49898445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:35.980696917 CET4454989739.80.197.203192.168.2.7
                                        Jan 14, 2025 23:01:35.980768919 CET4454989839.80.197.1192.168.2.7
                                        Jan 14, 2025 23:01:35.980808020 CET49897445192.168.2.739.80.197.203
                                        Jan 14, 2025 23:01:35.980849981 CET49898445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:35.980873108 CET49898445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:35.983261108 CET49899445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:35.985774994 CET4454989839.80.197.1192.168.2.7
                                        Jan 14, 2025 23:01:35.985841990 CET49898445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:35.988039017 CET4454989939.80.197.1192.168.2.7
                                        Jan 14, 2025 23:01:35.989233017 CET49899445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:35.989233017 CET49899445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:35.993995905 CET4454989939.80.197.1192.168.2.7
                                        Jan 14, 2025 23:01:36.573551893 CET49704443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:36.573857069 CET49912443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:36.573955059 CET44349912104.98.116.138192.168.2.7
                                        Jan 14, 2025 23:01:36.574038029 CET49912443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:36.577647924 CET49912443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:01:36.577682018 CET44349912104.98.116.138192.168.2.7
                                        Jan 14, 2025 23:01:36.578355074 CET44349704104.98.116.138192.168.2.7
                                        Jan 14, 2025 23:01:37.969254971 CET49677443192.168.2.720.50.201.200
                                        Jan 14, 2025 23:01:37.987736940 CET49932445192.168.2.7140.192.249.69
                                        Jan 14, 2025 23:01:37.993165970 CET44549932140.192.249.69192.168.2.7
                                        Jan 14, 2025 23:01:37.993231058 CET49932445192.168.2.7140.192.249.69
                                        Jan 14, 2025 23:01:37.993311882 CET49932445192.168.2.7140.192.249.69
                                        Jan 14, 2025 23:01:37.993441105 CET49933445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:37.998307943 CET44549933140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:01:37.998402119 CET49933445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:37.998403072 CET49933445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:37.998419046 CET44549932140.192.249.69192.168.2.7
                                        Jan 14, 2025 23:01:37.998470068 CET49932445192.168.2.7140.192.249.69
                                        Jan 14, 2025 23:01:37.998744011 CET49934445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:38.003520012 CET44549933140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:01:38.003557920 CET44549934140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:01:38.003595114 CET49933445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:38.003614902 CET49934445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:38.003628016 CET49934445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:38.008444071 CET44549934140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:01:40.003591061 CET49971445192.168.2.771.53.117.51
                                        Jan 14, 2025 23:01:40.008404016 CET4454997171.53.117.51192.168.2.7
                                        Jan 14, 2025 23:01:40.008526087 CET49971445192.168.2.771.53.117.51
                                        Jan 14, 2025 23:01:40.008610964 CET49971445192.168.2.771.53.117.51
                                        Jan 14, 2025 23:01:40.008718967 CET49972445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:01:40.013396025 CET4454997171.53.117.51192.168.2.7
                                        Jan 14, 2025 23:01:40.013514042 CET4454997271.53.117.1192.168.2.7
                                        Jan 14, 2025 23:01:40.013551950 CET4454997171.53.117.51192.168.2.7
                                        Jan 14, 2025 23:01:40.013581991 CET49972445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:01:40.013711929 CET49972445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:01:40.013786077 CET49971445192.168.2.771.53.117.51
                                        Jan 14, 2025 23:01:40.013994932 CET49973445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:01:40.018753052 CET4454997271.53.117.1192.168.2.7
                                        Jan 14, 2025 23:01:40.018811941 CET49972445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:01:40.018940926 CET4454997371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:01:40.019109011 CET49973445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:01:40.019165993 CET49973445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:01:40.023993969 CET4454997371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:01:42.016896009 CET50005445192.168.2.759.130.120.189
                                        Jan 14, 2025 23:01:42.021930933 CET4455000559.130.120.189192.168.2.7
                                        Jan 14, 2025 23:01:42.022042036 CET50005445192.168.2.759.130.120.189
                                        Jan 14, 2025 23:01:42.022089005 CET50005445192.168.2.759.130.120.189
                                        Jan 14, 2025 23:01:42.022224903 CET50006445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:01:42.027400017 CET4455000659.130.120.1192.168.2.7
                                        Jan 14, 2025 23:01:42.027411938 CET4455000559.130.120.189192.168.2.7
                                        Jan 14, 2025 23:01:42.027476072 CET50005445192.168.2.759.130.120.189
                                        Jan 14, 2025 23:01:42.027544022 CET50006445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:01:42.027544022 CET50006445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:01:42.027750015 CET50007445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:01:42.032532930 CET4455000759.130.120.1192.168.2.7
                                        Jan 14, 2025 23:01:42.032630920 CET50007445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:01:42.032630920 CET50007445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:01:42.032819033 CET4455000659.130.120.1192.168.2.7
                                        Jan 14, 2025 23:01:42.032861948 CET50006445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:01:42.037408113 CET4455000759.130.120.1192.168.2.7
                                        Jan 14, 2025 23:01:44.032547951 CET50045445192.168.2.7152.147.57.183
                                        Jan 14, 2025 23:01:44.038532972 CET44550045152.147.57.183192.168.2.7
                                        Jan 14, 2025 23:01:44.038614035 CET50045445192.168.2.7152.147.57.183
                                        Jan 14, 2025 23:01:44.038649082 CET50045445192.168.2.7152.147.57.183
                                        Jan 14, 2025 23:01:44.038861036 CET50046445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:01:44.044879913 CET44550045152.147.57.183192.168.2.7
                                        Jan 14, 2025 23:01:44.044895887 CET44550046152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:01:44.044961929 CET50045445192.168.2.7152.147.57.183
                                        Jan 14, 2025 23:01:44.045038939 CET50046445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:01:44.045121908 CET50046445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:01:44.045703888 CET50047445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:01:44.050020933 CET44550046152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:01:44.050074100 CET50046445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:01:44.050549030 CET44550047152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:01:44.050757885 CET50047445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:01:44.050801039 CET50047445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:01:44.055514097 CET44550047152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:01:46.048202991 CET50079445192.168.2.758.100.254.22
                                        Jan 14, 2025 23:01:46.052982092 CET4455007958.100.254.22192.168.2.7
                                        Jan 14, 2025 23:01:46.053071976 CET50079445192.168.2.758.100.254.22
                                        Jan 14, 2025 23:01:46.053155899 CET50079445192.168.2.758.100.254.22
                                        Jan 14, 2025 23:01:46.053343058 CET50080445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:01:46.058130980 CET4455008058.100.254.1192.168.2.7
                                        Jan 14, 2025 23:01:46.058191061 CET50080445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:01:46.058212042 CET50080445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:01:46.058444977 CET50081445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:01:46.059006929 CET4455007958.100.254.22192.168.2.7
                                        Jan 14, 2025 23:01:46.059065104 CET50079445192.168.2.758.100.254.22
                                        Jan 14, 2025 23:01:46.063138008 CET4455008058.100.254.1192.168.2.7
                                        Jan 14, 2025 23:01:46.063189983 CET50080445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:01:46.063194990 CET4455008158.100.254.1192.168.2.7
                                        Jan 14, 2025 23:01:46.063369036 CET50081445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:01:46.063369036 CET50081445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:01:46.068191051 CET4455008158.100.254.1192.168.2.7
                                        Jan 14, 2025 23:01:47.136310101 CET44549725141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:47.136476994 CET49725445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:47.136476994 CET49725445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:47.136559010 CET49725445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:47.141403913 CET44549725141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:47.141438961 CET44549725141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:48.065383911 CET50117445192.168.2.7102.252.16.166
                                        Jan 14, 2025 23:01:48.070274115 CET44550117102.252.16.166192.168.2.7
                                        Jan 14, 2025 23:01:48.070363045 CET50117445192.168.2.7102.252.16.166
                                        Jan 14, 2025 23:01:48.070435047 CET50117445192.168.2.7102.252.16.166
                                        Jan 14, 2025 23:01:48.070611954 CET50119445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:01:48.075366974 CET44550117102.252.16.166192.168.2.7
                                        Jan 14, 2025 23:01:48.075423956 CET44550119102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:01:48.075454950 CET50117445192.168.2.7102.252.16.166
                                        Jan 14, 2025 23:01:48.075494051 CET50119445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:01:48.075562000 CET50119445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:01:48.075917006 CET50120445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:01:48.080360889 CET44550119102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:01:48.080421925 CET50119445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:01:48.080698967 CET44550120102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:01:48.080765009 CET50120445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:01:48.080828905 CET50120445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:01:48.085546970 CET44550120102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:01:49.169904947 CET44549761198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:49.169986010 CET49761445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:49.170049906 CET49761445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:49.170157909 CET49761445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:49.174767017 CET44549761198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:49.174874067 CET44549761198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:50.079982996 CET50155445192.168.2.767.118.253.243
                                        Jan 14, 2025 23:01:50.084872961 CET4455015567.118.253.243192.168.2.7
                                        Jan 14, 2025 23:01:50.084939957 CET50155445192.168.2.767.118.253.243
                                        Jan 14, 2025 23:01:50.084980965 CET50155445192.168.2.767.118.253.243
                                        Jan 14, 2025 23:01:50.085098028 CET50156445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:01:50.089907885 CET4455015667.118.253.1192.168.2.7
                                        Jan 14, 2025 23:01:50.089917898 CET4455015567.118.253.243192.168.2.7
                                        Jan 14, 2025 23:01:50.089986086 CET50155445192.168.2.767.118.253.243
                                        Jan 14, 2025 23:01:50.089992046 CET50156445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:01:50.090058088 CET50156445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:01:50.090346098 CET50157445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:01:50.094948053 CET4455015667.118.253.1192.168.2.7
                                        Jan 14, 2025 23:01:50.094990969 CET50156445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:01:50.095164061 CET4455015767.118.253.1192.168.2.7
                                        Jan 14, 2025 23:01:50.095230103 CET50157445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:01:50.095268965 CET50157445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:01:50.100044012 CET4455015767.118.253.1192.168.2.7
                                        Jan 14, 2025 23:01:50.141942024 CET50160445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:50.146821022 CET44550160141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:50.146909952 CET50160445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:50.146956921 CET50160445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:01:50.151743889 CET44550160141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:01:51.216571093 CET4454979999.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:51.216706991 CET49799445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:51.216809034 CET49799445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:51.216809034 CET49799445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:51.221796989 CET4454979999.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:51.221818924 CET4454979999.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:52.116838932 CET50181445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.121646881 CET44550181221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:01:52.121766090 CET50181445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.121799946 CET50181445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.121931076 CET50182445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.126713037 CET44550182221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:01:52.126766920 CET50182445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.126810074 CET50182445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.126981974 CET44550181221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:01:52.127115011 CET50181445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.127340078 CET50183445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.131820917 CET44550182221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:01:52.131870985 CET50182445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.132097006 CET44550183221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:01:52.132167101 CET50183445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.132167101 CET50183445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:01:52.137001038 CET44550183221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:01:52.187174082 CET50184445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:52.191925049 CET44550184198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:52.191991091 CET50184445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:52.192050934 CET50184445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:01:52.196769953 CET44550184198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:01:53.167924881 CET4454983179.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:53.167998075 CET49831445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:53.170617104 CET49831445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:53.170681953 CET49831445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:53.175447941 CET4454983179.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:53.175457954 CET4454983179.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:54.111216068 CET50196445192.168.2.7102.242.240.207
                                        Jan 14, 2025 23:01:54.116430044 CET44550196102.242.240.207192.168.2.7
                                        Jan 14, 2025 23:01:54.116518021 CET50196445192.168.2.7102.242.240.207
                                        Jan 14, 2025 23:01:54.116564989 CET50196445192.168.2.7102.242.240.207
                                        Jan 14, 2025 23:01:54.116688967 CET50197445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:01:54.121567965 CET44550197102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:01:54.121711016 CET44550196102.242.240.207192.168.2.7
                                        Jan 14, 2025 23:01:54.121743917 CET50197445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:01:54.121783018 CET50196445192.168.2.7102.242.240.207
                                        Jan 14, 2025 23:01:54.121859074 CET50197445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:01:54.122142076 CET50198445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:01:54.126739025 CET44550197102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:01:54.126802921 CET50197445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:01:54.127019882 CET44550198102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:01:54.127091885 CET50198445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:01:54.127121925 CET50198445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:01:54.132606983 CET44550198102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:01:54.220312119 CET50201445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:54.227456093 CET4455020199.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:54.227600098 CET50201445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:54.227658987 CET50201445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:01:54.232445002 CET4455020199.232.202.1192.168.2.7
                                        Jan 14, 2025 23:01:55.590025902 CET44549864207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:55.590123892 CET49864445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:55.602873087 CET49864445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:55.602997065 CET49864445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:55.607660055 CET44549864207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:55.607810020 CET44549864207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:56.131459951 CET50214445192.168.2.7148.67.37.27
                                        Jan 14, 2025 23:01:56.136398077 CET44550214148.67.37.27192.168.2.7
                                        Jan 14, 2025 23:01:56.136476994 CET50214445192.168.2.7148.67.37.27
                                        Jan 14, 2025 23:01:56.153240919 CET50214445192.168.2.7148.67.37.27
                                        Jan 14, 2025 23:01:56.153438091 CET50215445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:01:56.158221960 CET44550214148.67.37.27192.168.2.7
                                        Jan 14, 2025 23:01:56.158289909 CET50214445192.168.2.7148.67.37.27
                                        Jan 14, 2025 23:01:56.158313036 CET44550215148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:01:56.158379078 CET50215445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:01:56.167176008 CET50215445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:01:56.167454004 CET50216445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:01:56.172307014 CET44550215148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:01:56.172349930 CET44550216148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:01:56.172386885 CET50215445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:01:56.172418118 CET50216445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:01:56.178951979 CET50216445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:01:56.179189920 CET50217445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:56.183800936 CET44550216148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:01:56.184113026 CET4455021779.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:56.184184074 CET50217445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:56.186871052 CET50217445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:01:56.191723108 CET4455021779.169.8.1192.168.2.7
                                        Jan 14, 2025 23:01:57.371274948 CET4454989939.80.197.1192.168.2.7
                                        Jan 14, 2025 23:01:57.374064922 CET49899445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:57.374166965 CET49899445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:57.374248981 CET49899445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:01:57.378969908 CET4454989939.80.197.1192.168.2.7
                                        Jan 14, 2025 23:01:57.379026890 CET4454989939.80.197.1192.168.2.7
                                        Jan 14, 2025 23:01:58.142229080 CET50230445192.168.2.753.1.126.57
                                        Jan 14, 2025 23:01:58.147156954 CET4455023053.1.126.57192.168.2.7
                                        Jan 14, 2025 23:01:58.147229910 CET50230445192.168.2.753.1.126.57
                                        Jan 14, 2025 23:01:58.147252083 CET50230445192.168.2.753.1.126.57
                                        Jan 14, 2025 23:01:58.147452116 CET50231445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:01:58.152226925 CET4455023053.1.126.57192.168.2.7
                                        Jan 14, 2025 23:01:58.152290106 CET50230445192.168.2.753.1.126.57
                                        Jan 14, 2025 23:01:58.152318954 CET4455023153.1.126.1192.168.2.7
                                        Jan 14, 2025 23:01:58.152395010 CET50231445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:01:58.152395010 CET50231445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:01:58.152690887 CET50232445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:01:58.157490015 CET4455023153.1.126.1192.168.2.7
                                        Jan 14, 2025 23:01:58.157553911 CET50231445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:01:58.157643080 CET4455023253.1.126.1192.168.2.7
                                        Jan 14, 2025 23:01:58.157706022 CET50232445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:01:58.157723904 CET50232445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:01:58.162576914 CET4455023253.1.126.1192.168.2.7
                                        Jan 14, 2025 23:01:58.610907078 CET50236445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:58.615870953 CET44550236207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:58.616002083 CET50236445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:58.616035938 CET50236445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:01:58.621550083 CET44550236207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:01:59.388895035 CET44549934140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:01:59.388988972 CET49934445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:59.389204025 CET49934445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:59.389204025 CET49934445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:01:59.394045115 CET44549934140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:01:59.394099951 CET44549934140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:02:00.158679962 CET50247445192.168.2.7130.143.132.21
                                        Jan 14, 2025 23:02:00.163528919 CET44550247130.143.132.21192.168.2.7
                                        Jan 14, 2025 23:02:00.163605928 CET50247445192.168.2.7130.143.132.21
                                        Jan 14, 2025 23:02:00.163778067 CET50247445192.168.2.7130.143.132.21
                                        Jan 14, 2025 23:02:00.163928986 CET50248445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:00.168562889 CET44550247130.143.132.21192.168.2.7
                                        Jan 14, 2025 23:02:00.168629885 CET50247445192.168.2.7130.143.132.21
                                        Jan 14, 2025 23:02:00.168759108 CET44550248130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:00.168808937 CET50248445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:00.168884039 CET50248445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:00.169243097 CET50249445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:00.173697948 CET44550248130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:00.173738956 CET50248445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:00.174071074 CET44550249130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:00.174129963 CET50249445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:00.174149990 CET50249445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:00.179064035 CET44550249130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:00.376605988 CET50250445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:02:00.381541014 CET4455025039.80.197.1192.168.2.7
                                        Jan 14, 2025 23:02:00.381633043 CET50250445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:02:00.381691933 CET50250445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:02:00.388720989 CET4455025039.80.197.1192.168.2.7
                                        Jan 14, 2025 23:02:01.423940897 CET4454997371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:01.424022913 CET49973445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:01.424087048 CET49973445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:01.424249887 CET49973445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:01.428864002 CET4454997371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:01.429126024 CET4454997371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:02.033312082 CET50263445192.168.2.770.226.142.101
                                        Jan 14, 2025 23:02:02.038193941 CET4455026370.226.142.101192.168.2.7
                                        Jan 14, 2025 23:02:02.038391113 CET50263445192.168.2.770.226.142.101
                                        Jan 14, 2025 23:02:02.038391113 CET50263445192.168.2.770.226.142.101
                                        Jan 14, 2025 23:02:02.038391113 CET50264445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:02.043585062 CET4455026470.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:02.043770075 CET4455026370.226.142.101192.168.2.7
                                        Jan 14, 2025 23:02:02.043785095 CET50264445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:02.043785095 CET50264445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:02.043831110 CET50263445192.168.2.770.226.142.101
                                        Jan 14, 2025 23:02:02.043906927 CET50265445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:02.049155951 CET4455026570.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:02.049243927 CET50265445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:02.049254894 CET4455026470.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:02.049280882 CET50265445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:02.049432039 CET50264445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:02.054455042 CET4455026570.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:02.392174006 CET50269445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:02:02.397242069 CET44550269140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:02:02.397358894 CET50269445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:02:02.397397995 CET50269445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:02:02.402338028 CET44550269140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:02:03.436161995 CET4455000759.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:03.436248064 CET50007445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:03.445348978 CET50007445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:03.445403099 CET50007445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:03.450259924 CET4455000759.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:03.450299978 CET4455000759.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:03.790019989 CET50275445192.168.2.7149.20.247.102
                                        Jan 14, 2025 23:02:03.794895887 CET44550275149.20.247.102192.168.2.7
                                        Jan 14, 2025 23:02:03.794956923 CET50275445192.168.2.7149.20.247.102
                                        Jan 14, 2025 23:02:03.796916962 CET50275445192.168.2.7149.20.247.102
                                        Jan 14, 2025 23:02:03.797086954 CET50276445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:03.801734924 CET44550275149.20.247.102192.168.2.7
                                        Jan 14, 2025 23:02:03.801781893 CET50275445192.168.2.7149.20.247.102
                                        Jan 14, 2025 23:02:03.801920891 CET44550276149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:03.801974058 CET50276445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:03.805161953 CET50276445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:03.805388927 CET50277445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:03.810081959 CET44550276149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:03.810129881 CET50276445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:03.810209990 CET44550277149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:03.810267925 CET50277445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:03.810286045 CET50277445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:03.815051079 CET44550277149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:04.439189911 CET50283445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:04.444040060 CET4455028371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:04.445012093 CET50283445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:04.445054054 CET50283445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:04.449904919 CET4455028371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:05.419792891 CET44550047152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:02:05.419862986 CET50047445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:05.419905901 CET50047445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:05.419953108 CET50047445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:05.423741102 CET50289445192.168.2.763.48.67.31
                                        Jan 14, 2025 23:02:05.425837040 CET44550047152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:02:05.425868034 CET44550047152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:02:05.429685116 CET4455028963.48.67.31192.168.2.7
                                        Jan 14, 2025 23:02:05.429755926 CET50289445192.168.2.763.48.67.31
                                        Jan 14, 2025 23:02:05.429776907 CET50289445192.168.2.763.48.67.31
                                        Jan 14, 2025 23:02:05.429914951 CET50290445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:05.436014891 CET4455029063.48.67.1192.168.2.7
                                        Jan 14, 2025 23:02:05.436077118 CET50290445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:05.436096907 CET50290445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:05.436167955 CET4455028963.48.67.31192.168.2.7
                                        Jan 14, 2025 23:02:05.436217070 CET50289445192.168.2.763.48.67.31
                                        Jan 14, 2025 23:02:05.436301947 CET50291445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:05.441134930 CET4455029063.48.67.1192.168.2.7
                                        Jan 14, 2025 23:02:05.441168070 CET4455029163.48.67.1192.168.2.7
                                        Jan 14, 2025 23:02:05.441184998 CET50290445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:05.441217899 CET50291445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:05.441239119 CET50291445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:05.446158886 CET4455029163.48.67.1192.168.2.7
                                        Jan 14, 2025 23:02:06.454838037 CET50298445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:06.459918976 CET4455029859.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:06.459989071 CET50298445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:06.460026979 CET50298445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:06.465176105 CET4455029859.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:06.955308914 CET50302445192.168.2.7126.112.145.183
                                        Jan 14, 2025 23:02:06.960376024 CET44550302126.112.145.183192.168.2.7
                                        Jan 14, 2025 23:02:06.960485935 CET50302445192.168.2.7126.112.145.183
                                        Jan 14, 2025 23:02:06.960544109 CET50302445192.168.2.7126.112.145.183
                                        Jan 14, 2025 23:02:06.960787058 CET50303445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:06.965502024 CET44550302126.112.145.183192.168.2.7
                                        Jan 14, 2025 23:02:06.965573072 CET50302445192.168.2.7126.112.145.183
                                        Jan 14, 2025 23:02:06.965615034 CET44550303126.112.145.1192.168.2.7
                                        Jan 14, 2025 23:02:06.965679884 CET50303445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:06.965714931 CET50303445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:06.966020107 CET50304445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:06.970861912 CET44550304126.112.145.1192.168.2.7
                                        Jan 14, 2025 23:02:06.970889091 CET44550303126.112.145.1192.168.2.7
                                        Jan 14, 2025 23:02:06.970957994 CET50304445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:06.971010923 CET50304445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:06.971018076 CET50303445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:06.975843906 CET44550304126.112.145.1192.168.2.7
                                        Jan 14, 2025 23:02:07.418718100 CET4455008158.100.254.1192.168.2.7
                                        Jan 14, 2025 23:02:07.418838978 CET50081445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:02:07.418915033 CET50081445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:02:07.419008017 CET50081445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:02:07.423773050 CET4455008158.100.254.1192.168.2.7
                                        Jan 14, 2025 23:02:07.423825026 CET4455008158.100.254.1192.168.2.7
                                        Jan 14, 2025 23:02:08.377764940 CET50313445192.168.2.759.193.85.172
                                        Jan 14, 2025 23:02:08.382637024 CET4455031359.193.85.172192.168.2.7
                                        Jan 14, 2025 23:02:08.382765055 CET50313445192.168.2.759.193.85.172
                                        Jan 14, 2025 23:02:08.382920027 CET50313445192.168.2.759.193.85.172
                                        Jan 14, 2025 23:02:08.383162975 CET50314445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:08.387877941 CET4455031359.193.85.172192.168.2.7
                                        Jan 14, 2025 23:02:08.387955904 CET50313445192.168.2.759.193.85.172
                                        Jan 14, 2025 23:02:08.388000965 CET4455031459.193.85.1192.168.2.7
                                        Jan 14, 2025 23:02:08.388072968 CET50314445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:08.388169050 CET50314445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:08.388542891 CET50315445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:08.394150972 CET4455031459.193.85.1192.168.2.7
                                        Jan 14, 2025 23:02:08.394184113 CET4455031559.193.85.1192.168.2.7
                                        Jan 14, 2025 23:02:08.394207954 CET50314445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:08.394260883 CET50315445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:08.394310951 CET50315445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:08.400316000 CET4455031559.193.85.1192.168.2.7
                                        Jan 14, 2025 23:02:08.423721075 CET50316445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:08.430896044 CET44550316152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:02:08.430989981 CET50316445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:08.431026936 CET50316445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:08.435856104 CET44550316152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:02:09.434504986 CET44550120102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:02:09.434588909 CET50120445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:02:09.434638977 CET50120445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:02:09.434700966 CET50120445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:02:09.439507008 CET44550120102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:02:09.439539909 CET44550120102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:02:09.705212116 CET50317445192.168.2.7130.184.107.238
                                        Jan 14, 2025 23:02:09.710361958 CET44550317130.184.107.238192.168.2.7
                                        Jan 14, 2025 23:02:09.710546017 CET50317445192.168.2.7130.184.107.238
                                        Jan 14, 2025 23:02:09.710583925 CET50317445192.168.2.7130.184.107.238
                                        Jan 14, 2025 23:02:09.710746050 CET50318445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:09.715703011 CET44550317130.184.107.238192.168.2.7
                                        Jan 14, 2025 23:02:09.715739012 CET44550318130.184.107.1192.168.2.7
                                        Jan 14, 2025 23:02:09.715765953 CET50317445192.168.2.7130.184.107.238
                                        Jan 14, 2025 23:02:09.715811968 CET50318445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:09.715915918 CET50318445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:09.716202021 CET50319445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:09.721110106 CET44550319130.184.107.1192.168.2.7
                                        Jan 14, 2025 23:02:09.721175909 CET50319445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:09.721256018 CET44550318130.184.107.1192.168.2.7
                                        Jan 14, 2025 23:02:09.721312046 CET50318445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:09.721323013 CET50319445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:09.726141930 CET44550319130.184.107.1192.168.2.7
                                        Jan 14, 2025 23:02:10.423743963 CET50320445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:02:10.428812981 CET4455032058.100.254.1192.168.2.7
                                        Jan 14, 2025 23:02:10.428884983 CET50320445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:02:10.428927898 CET50320445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:02:10.433772087 CET4455032058.100.254.1192.168.2.7
                                        Jan 14, 2025 23:02:10.939614058 CET50321445192.168.2.7206.169.28.154
                                        Jan 14, 2025 23:02:10.944722891 CET44550321206.169.28.154192.168.2.7
                                        Jan 14, 2025 23:02:10.944814920 CET50321445192.168.2.7206.169.28.154
                                        Jan 14, 2025 23:02:10.944844007 CET50321445192.168.2.7206.169.28.154
                                        Jan 14, 2025 23:02:10.945038080 CET50322445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:10.950014114 CET44550322206.169.28.1192.168.2.7
                                        Jan 14, 2025 23:02:10.950048923 CET44550321206.169.28.154192.168.2.7
                                        Jan 14, 2025 23:02:10.950087070 CET50322445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:10.950103998 CET50321445192.168.2.7206.169.28.154
                                        Jan 14, 2025 23:02:10.950182915 CET50322445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:10.950582981 CET50323445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:10.955552101 CET44550323206.169.28.1192.168.2.7
                                        Jan 14, 2025 23:02:10.955583096 CET44550322206.169.28.1192.168.2.7
                                        Jan 14, 2025 23:02:10.955626965 CET50323445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:10.955645084 CET50322445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:10.955673933 CET50323445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:10.960505009 CET44550323206.169.28.1192.168.2.7
                                        Jan 14, 2025 23:02:11.469803095 CET4455015767.118.253.1192.168.2.7
                                        Jan 14, 2025 23:02:11.470078945 CET50157445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:02:11.470078945 CET50157445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:02:11.470078945 CET50157445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:02:11.475150108 CET4455015767.118.253.1192.168.2.7
                                        Jan 14, 2025 23:02:11.475162983 CET4455015767.118.253.1192.168.2.7
                                        Jan 14, 2025 23:02:11.512772083 CET44550160141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:02:11.512958050 CET50160445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:02:11.513030052 CET50160445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:02:11.513086081 CET50160445192.168.2.7141.193.184.1
                                        Jan 14, 2025 23:02:11.517843008 CET44550160141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:02:11.517869949 CET44550160141.193.184.1192.168.2.7
                                        Jan 14, 2025 23:02:11.564547062 CET50324445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:11.569420099 CET44550324141.193.184.2192.168.2.7
                                        Jan 14, 2025 23:02:11.569492102 CET50324445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:11.569547892 CET50324445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:11.569802999 CET50325445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:11.574609995 CET44550324141.193.184.2192.168.2.7
                                        Jan 14, 2025 23:02:11.574620008 CET44550325141.193.184.2192.168.2.7
                                        Jan 14, 2025 23:02:11.574661970 CET50324445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:11.574682951 CET50325445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:11.574734926 CET50325445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:11.579471111 CET44550325141.193.184.2192.168.2.7
                                        Jan 14, 2025 23:02:12.101903915 CET50326445192.168.2.7132.251.70.33
                                        Jan 14, 2025 23:02:12.106758118 CET44550326132.251.70.33192.168.2.7
                                        Jan 14, 2025 23:02:12.106832981 CET50326445192.168.2.7132.251.70.33
                                        Jan 14, 2025 23:02:12.106924057 CET50326445192.168.2.7132.251.70.33
                                        Jan 14, 2025 23:02:12.107089043 CET50327445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:12.111890078 CET44550326132.251.70.33192.168.2.7
                                        Jan 14, 2025 23:02:12.111901999 CET44550327132.251.70.1192.168.2.7
                                        Jan 14, 2025 23:02:12.111937046 CET50326445192.168.2.7132.251.70.33
                                        Jan 14, 2025 23:02:12.111970901 CET50327445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:12.112052917 CET50327445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:12.116884947 CET50328445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:12.117237091 CET44550327132.251.70.1192.168.2.7
                                        Jan 14, 2025 23:02:12.117279053 CET50327445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:12.121745110 CET44550328132.251.70.1192.168.2.7
                                        Jan 14, 2025 23:02:12.121793032 CET50328445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:12.121820927 CET50328445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:12.126590967 CET44550328132.251.70.1192.168.2.7
                                        Jan 14, 2025 23:02:12.442528009 CET50329445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:02:12.447290897 CET44550329102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:02:12.447385073 CET50329445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:02:12.447416067 CET50329445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:02:12.452157021 CET44550329102.252.16.1192.168.2.7
                                        Jan 14, 2025 23:02:13.329467058 CET50330445192.168.2.7109.143.164.166
                                        Jan 14, 2025 23:02:13.334217072 CET44550330109.143.164.166192.168.2.7
                                        Jan 14, 2025 23:02:13.334278107 CET50330445192.168.2.7109.143.164.166
                                        Jan 14, 2025 23:02:13.334351063 CET50330445192.168.2.7109.143.164.166
                                        Jan 14, 2025 23:02:13.334481955 CET50331445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:13.339240074 CET44550330109.143.164.166192.168.2.7
                                        Jan 14, 2025 23:02:13.339262962 CET44550331109.143.164.1192.168.2.7
                                        Jan 14, 2025 23:02:13.339286089 CET50330445192.168.2.7109.143.164.166
                                        Jan 14, 2025 23:02:13.339332104 CET50331445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:13.339437962 CET50331445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:13.344232082 CET44550331109.143.164.1192.168.2.7
                                        Jan 14, 2025 23:02:13.344278097 CET50331445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:13.408323050 CET50332445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:13.413227081 CET44550332109.143.164.1192.168.2.7
                                        Jan 14, 2025 23:02:13.413311958 CET50332445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:13.413363934 CET50332445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:13.418163061 CET44550332109.143.164.1192.168.2.7
                                        Jan 14, 2025 23:02:13.518467903 CET44550183221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:02:13.518541098 CET50183445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:02:13.518570900 CET50183445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:02:13.518618107 CET50183445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:02:13.523375988 CET44550183221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:02:13.523386002 CET44550183221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:02:13.561347008 CET44550184198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:02:13.561404943 CET50184445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:02:13.561480999 CET50184445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:02:13.561572075 CET50184445192.168.2.7198.110.238.1
                                        Jan 14, 2025 23:02:13.566230059 CET44550184198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:02:13.566375971 CET44550184198.110.238.1192.168.2.7
                                        Jan 14, 2025 23:02:13.627127886 CET50333445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:13.631977081 CET44550333198.110.238.2192.168.2.7
                                        Jan 14, 2025 23:02:13.632065058 CET50333445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:13.632091999 CET50333445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:13.632606983 CET50334445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:13.637907028 CET44550334198.110.238.2192.168.2.7
                                        Jan 14, 2025 23:02:13.637979984 CET50334445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:13.637984037 CET44550333198.110.238.2192.168.2.7
                                        Jan 14, 2025 23:02:13.638015032 CET50334445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:13.638086081 CET50333445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:13.643021107 CET44550334198.110.238.2192.168.2.7
                                        Jan 14, 2025 23:02:14.283557892 CET50335445192.168.2.7219.56.238.165
                                        Jan 14, 2025 23:02:14.288436890 CET44550335219.56.238.165192.168.2.7
                                        Jan 14, 2025 23:02:14.288535118 CET50335445192.168.2.7219.56.238.165
                                        Jan 14, 2025 23:02:14.288583994 CET50335445192.168.2.7219.56.238.165
                                        Jan 14, 2025 23:02:14.288800955 CET50336445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:14.293668985 CET44550336219.56.238.1192.168.2.7
                                        Jan 14, 2025 23:02:14.293740034 CET50336445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:14.293827057 CET44550335219.56.238.165192.168.2.7
                                        Jan 14, 2025 23:02:14.293847084 CET50336445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:14.293880939 CET50335445192.168.2.7219.56.238.165
                                        Jan 14, 2025 23:02:14.294354916 CET50337445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:14.300122976 CET44550337219.56.238.1192.168.2.7
                                        Jan 14, 2025 23:02:14.300154924 CET44550336219.56.238.1192.168.2.7
                                        Jan 14, 2025 23:02:14.300206900 CET50337445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:14.300225019 CET50336445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:14.300259113 CET50337445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:14.306236029 CET44550337219.56.238.1192.168.2.7
                                        Jan 14, 2025 23:02:14.471267939 CET50338445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:02:14.476315022 CET4455033867.118.253.1192.168.2.7
                                        Jan 14, 2025 23:02:14.476402998 CET50338445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:02:14.476486921 CET50338445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:02:14.481276989 CET4455033867.118.253.1192.168.2.7
                                        Jan 14, 2025 23:02:15.221841097 CET50340445192.168.2.7182.19.215.54
                                        Jan 14, 2025 23:02:15.226957083 CET44550340182.19.215.54192.168.2.7
                                        Jan 14, 2025 23:02:15.227039099 CET50340445192.168.2.7182.19.215.54
                                        Jan 14, 2025 23:02:15.227097988 CET50340445192.168.2.7182.19.215.54
                                        Jan 14, 2025 23:02:15.227255106 CET50341445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:15.232105970 CET44550341182.19.215.1192.168.2.7
                                        Jan 14, 2025 23:02:15.232156992 CET44550340182.19.215.54192.168.2.7
                                        Jan 14, 2025 23:02:15.232175112 CET50341445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:15.232202053 CET50341445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:15.232219934 CET50340445192.168.2.7182.19.215.54
                                        Jan 14, 2025 23:02:15.232769012 CET50342445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:15.238034964 CET44550341182.19.215.1192.168.2.7
                                        Jan 14, 2025 23:02:15.238089085 CET50341445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:15.238544941 CET44550342182.19.215.1192.168.2.7
                                        Jan 14, 2025 23:02:15.238606930 CET50342445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:15.238660097 CET50342445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:15.243421078 CET44550342182.19.215.1192.168.2.7
                                        Jan 14, 2025 23:02:15.514755964 CET44550198102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:02:15.514832973 CET50198445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:02:15.514873981 CET50198445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:02:15.514894009 CET50198445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:02:15.519798040 CET44550198102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:02:15.519828081 CET44550198102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:02:15.637999058 CET4455020199.232.202.1192.168.2.7
                                        Jan 14, 2025 23:02:15.638135910 CET50201445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:02:15.638200045 CET50201445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:02:15.638262033 CET50201445192.168.2.799.232.202.1
                                        Jan 14, 2025 23:02:15.643220901 CET4455020199.232.202.1192.168.2.7
                                        Jan 14, 2025 23:02:15.643254042 CET4455020199.232.202.1192.168.2.7
                                        Jan 14, 2025 23:02:15.689894915 CET50343445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:15.695261955 CET4455034399.232.202.2192.168.2.7
                                        Jan 14, 2025 23:02:15.695384026 CET50343445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:15.695478916 CET50343445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:15.695724010 CET50344445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:15.700700998 CET4455034499.232.202.2192.168.2.7
                                        Jan 14, 2025 23:02:15.700778961 CET50344445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:15.700803995 CET50344445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:15.700941086 CET4455034399.232.202.2192.168.2.7
                                        Jan 14, 2025 23:02:15.701010942 CET50343445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:15.705586910 CET4455034499.232.202.2192.168.2.7
                                        Jan 14, 2025 23:02:16.114212036 CET50345445192.168.2.759.243.164.63
                                        Jan 14, 2025 23:02:16.119066000 CET4455034559.243.164.63192.168.2.7
                                        Jan 14, 2025 23:02:16.119133949 CET50345445192.168.2.759.243.164.63
                                        Jan 14, 2025 23:02:16.119215965 CET50345445192.168.2.759.243.164.63
                                        Jan 14, 2025 23:02:16.119357109 CET50346445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:16.124273062 CET4455034659.243.164.1192.168.2.7
                                        Jan 14, 2025 23:02:16.124310970 CET4455034559.243.164.63192.168.2.7
                                        Jan 14, 2025 23:02:16.124336004 CET50346445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:16.124356985 CET50345445192.168.2.759.243.164.63
                                        Jan 14, 2025 23:02:16.124433994 CET50346445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:16.124959946 CET50347445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:16.129455090 CET4455034659.243.164.1192.168.2.7
                                        Jan 14, 2025 23:02:16.129506111 CET50346445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:16.129760027 CET4455034759.243.164.1192.168.2.7
                                        Jan 14, 2025 23:02:16.129924059 CET50347445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:16.138712883 CET50347445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:16.143537045 CET4455034759.243.164.1192.168.2.7
                                        Jan 14, 2025 23:02:16.545572996 CET50348445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:02:16.550445080 CET44550348221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:02:16.550534964 CET50348445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:02:16.550733089 CET50348445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:02:16.555540085 CET44550348221.226.81.1192.168.2.7
                                        Jan 14, 2025 23:02:16.939780951 CET50349445192.168.2.7167.178.222.57
                                        Jan 14, 2025 23:02:16.944725037 CET44550349167.178.222.57192.168.2.7
                                        Jan 14, 2025 23:02:16.944792986 CET50349445192.168.2.7167.178.222.57
                                        Jan 14, 2025 23:02:16.944819927 CET50349445192.168.2.7167.178.222.57
                                        Jan 14, 2025 23:02:16.944984913 CET50350445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:16.949798107 CET44550349167.178.222.57192.168.2.7
                                        Jan 14, 2025 23:02:16.949830055 CET44550350167.178.222.1192.168.2.7
                                        Jan 14, 2025 23:02:16.949852943 CET50349445192.168.2.7167.178.222.57
                                        Jan 14, 2025 23:02:16.949934959 CET50350445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:16.949973106 CET50350445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:16.950185061 CET50351445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:16.954857111 CET44550350167.178.222.1192.168.2.7
                                        Jan 14, 2025 23:02:16.955046892 CET44550351167.178.222.1192.168.2.7
                                        Jan 14, 2025 23:02:16.955101967 CET50351445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:16.955102921 CET50350445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:16.955132008 CET50351445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:16.960135937 CET44550351167.178.222.1192.168.2.7
                                        Jan 14, 2025 23:02:17.544162989 CET44550216148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:02:17.546057940 CET4455021779.169.8.1192.168.2.7
                                        Jan 14, 2025 23:02:17.546159983 CET50216445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:02:17.546215057 CET50217445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:02:17.546215057 CET50217445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:02:17.546236038 CET50216445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:02:17.546258926 CET50217445192.168.2.779.169.8.1
                                        Jan 14, 2025 23:02:17.546283007 CET50216445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:02:17.551126003 CET44550216148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:02:17.551136971 CET4455021779.169.8.1192.168.2.7
                                        Jan 14, 2025 23:02:17.551143885 CET4455021779.169.8.1192.168.2.7
                                        Jan 14, 2025 23:02:17.551152945 CET44550216148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:02:17.611829996 CET50352445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:17.616712093 CET4455035279.169.8.2192.168.2.7
                                        Jan 14, 2025 23:02:17.618685007 CET50352445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:17.618685007 CET50352445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:17.619028091 CET50353445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:17.623672009 CET4455035279.169.8.2192.168.2.7
                                        Jan 14, 2025 23:02:17.623792887 CET4455035379.169.8.2192.168.2.7
                                        Jan 14, 2025 23:02:17.623846054 CET50352445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:17.623872042 CET50353445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:17.623922110 CET50353445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:17.628632069 CET4455035379.169.8.2192.168.2.7
                                        Jan 14, 2025 23:02:17.705832005 CET50354445192.168.2.754.79.81.130
                                        Jan 14, 2025 23:02:17.710650921 CET4455035454.79.81.130192.168.2.7
                                        Jan 14, 2025 23:02:17.710730076 CET50354445192.168.2.754.79.81.130
                                        Jan 14, 2025 23:02:17.710777044 CET50354445192.168.2.754.79.81.130
                                        Jan 14, 2025 23:02:17.710946083 CET50355445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:17.715774059 CET4455035554.79.81.1192.168.2.7
                                        Jan 14, 2025 23:02:17.715826988 CET50355445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:17.715893984 CET50355445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:17.715918064 CET4455035454.79.81.130192.168.2.7
                                        Jan 14, 2025 23:02:17.715960979 CET50354445192.168.2.754.79.81.130
                                        Jan 14, 2025 23:02:17.716186047 CET50356445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:17.720808983 CET4455035554.79.81.1192.168.2.7
                                        Jan 14, 2025 23:02:17.720931053 CET4455035654.79.81.1192.168.2.7
                                        Jan 14, 2025 23:02:17.720988035 CET50355445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:17.721015930 CET50356445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:17.721079111 CET50356445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:17.725789070 CET4455035654.79.81.1192.168.2.7
                                        Jan 14, 2025 23:02:18.517913103 CET50358445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:02:18.522758961 CET44550358102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:02:18.522850037 CET50358445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:02:18.522978067 CET50358445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:02:18.527770042 CET44550358102.242.240.1192.168.2.7
                                        Jan 14, 2025 23:02:19.341598988 CET44349912104.98.116.138192.168.2.7
                                        Jan 14, 2025 23:02:19.341844082 CET49912443192.168.2.7104.98.116.138
                                        Jan 14, 2025 23:02:19.529479980 CET4455023253.1.126.1192.168.2.7
                                        Jan 14, 2025 23:02:19.529603004 CET50232445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:02:19.529603958 CET50232445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:02:19.529670954 CET50232445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:02:19.534434080 CET4455023253.1.126.1192.168.2.7
                                        Jan 14, 2025 23:02:19.534513950 CET4455023253.1.126.1192.168.2.7
                                        Jan 14, 2025 23:02:19.998498917 CET44550236207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:02:19.998646975 CET50236445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:02:19.998868942 CET50236445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:02:19.999094963 CET50236445192.168.2.7207.147.9.1
                                        Jan 14, 2025 23:02:20.003922939 CET44550236207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:02:20.003961086 CET44550236207.147.9.1192.168.2.7
                                        Jan 14, 2025 23:02:20.064982891 CET50362445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:20.070039988 CET44550362207.147.9.2192.168.2.7
                                        Jan 14, 2025 23:02:20.070142984 CET50362445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:20.070158958 CET50362445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:20.070560932 CET50363445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:20.075099945 CET44550362207.147.9.2192.168.2.7
                                        Jan 14, 2025 23:02:20.075161934 CET50362445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:20.075432062 CET44550363207.147.9.2192.168.2.7
                                        Jan 14, 2025 23:02:20.075520992 CET50363445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:20.075520992 CET50363445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:20.080357075 CET44550363207.147.9.2192.168.2.7
                                        Jan 14, 2025 23:02:20.549254894 CET50366445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:02:20.554128885 CET44550366148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:02:20.554250956 CET50366445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:02:20.554338932 CET50366445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:02:20.559909105 CET44550366148.67.37.1192.168.2.7
                                        Jan 14, 2025 23:02:21.550285101 CET44550249130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:21.550360918 CET50249445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:21.550434113 CET50249445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:21.550488949 CET50249445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:21.555452108 CET44550249130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:21.555484056 CET44550249130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:21.779422045 CET4455025039.80.197.1192.168.2.7
                                        Jan 14, 2025 23:02:21.779520988 CET50250445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:02:21.779598951 CET50250445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:02:21.779669046 CET50250445192.168.2.739.80.197.1
                                        Jan 14, 2025 23:02:21.784538984 CET4455025039.80.197.1192.168.2.7
                                        Jan 14, 2025 23:02:21.784590960 CET4455025039.80.197.1192.168.2.7
                                        Jan 14, 2025 23:02:21.846122980 CET50374445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:21.851633072 CET4455037439.80.197.2192.168.2.7
                                        Jan 14, 2025 23:02:21.851710081 CET50374445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:21.851733923 CET50374445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:21.852020025 CET50376445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:21.856806040 CET4455037439.80.197.2192.168.2.7
                                        Jan 14, 2025 23:02:21.856862068 CET4455037639.80.197.2192.168.2.7
                                        Jan 14, 2025 23:02:21.856869936 CET50374445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:21.856935024 CET50376445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:21.856976032 CET50376445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:21.861735106 CET4455037639.80.197.2192.168.2.7
                                        Jan 14, 2025 23:02:22.533658028 CET50382445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:02:22.566766977 CET4455038253.1.126.1192.168.2.7
                                        Jan 14, 2025 23:02:22.566849947 CET50382445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:02:22.566904068 CET50382445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:02:22.571769953 CET4455038253.1.126.1192.168.2.7
                                        Jan 14, 2025 23:02:23.483172894 CET4455026570.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:23.483253956 CET50265445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:23.483294964 CET50265445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:23.483361006 CET50265445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:23.488562107 CET4455026570.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:23.488730907 CET4455026570.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:23.897830963 CET44550269140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:02:23.897947073 CET50269445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:02:23.898056030 CET50269445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:02:23.898056030 CET50269445192.168.2.7140.192.249.1
                                        Jan 14, 2025 23:02:23.902936935 CET44550269140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:02:23.903009892 CET44550269140.192.249.1192.168.2.7
                                        Jan 14, 2025 23:02:23.955559015 CET50397445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:23.960796118 CET44550397140.192.249.2192.168.2.7
                                        Jan 14, 2025 23:02:23.960896969 CET50397445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:23.960922003 CET50397445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:23.961272001 CET50398445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:23.966187000 CET44550398140.192.249.2192.168.2.7
                                        Jan 14, 2025 23:02:23.966288090 CET50398445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:23.966288090 CET50398445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:23.966377020 CET44550397140.192.249.2192.168.2.7
                                        Jan 14, 2025 23:02:23.966432095 CET50397445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:23.971144915 CET44550398140.192.249.2192.168.2.7
                                        Jan 14, 2025 23:02:24.564917088 CET50407445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:24.570589066 CET44550407130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:24.570658922 CET50407445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:24.570702076 CET50407445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:24.575495005 CET44550407130.143.132.1192.168.2.7
                                        Jan 14, 2025 23:02:25.175200939 CET44550277149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:25.175266981 CET50277445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:25.175335884 CET50277445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:25.175378084 CET50277445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:25.180232048 CET44550277149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:25.180262089 CET44550277149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:25.841409922 CET4455028371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:25.841682911 CET50283445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:25.841682911 CET50283445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:25.841684103 CET50283445192.168.2.771.53.117.1
                                        Jan 14, 2025 23:02:25.847026110 CET4455028371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:25.847081900 CET4455028371.53.117.1192.168.2.7
                                        Jan 14, 2025 23:02:25.893275976 CET50432445192.168.2.771.53.117.2
                                        Jan 14, 2025 23:02:25.898355961 CET4455043271.53.117.2192.168.2.7
                                        Jan 14, 2025 23:02:25.898478985 CET50432445192.168.2.771.53.117.2
                                        Jan 14, 2025 23:02:25.898585081 CET50432445192.168.2.771.53.117.2
                                        Jan 14, 2025 23:02:25.904010057 CET4455043271.53.117.2192.168.2.7
                                        Jan 14, 2025 23:02:25.904099941 CET50432445192.168.2.771.53.117.2
                                        Jan 14, 2025 23:02:25.912698030 CET50433445192.168.2.771.53.117.2
                                        Jan 14, 2025 23:02:25.917613029 CET4455043371.53.117.2192.168.2.7
                                        Jan 14, 2025 23:02:25.917706013 CET50433445192.168.2.771.53.117.2
                                        Jan 14, 2025 23:02:25.917746067 CET50433445192.168.2.771.53.117.2
                                        Jan 14, 2025 23:02:25.922605038 CET4455043371.53.117.2192.168.2.7
                                        Jan 14, 2025 23:02:26.486861944 CET50448445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:26.491988897 CET4455044870.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:26.492114067 CET50448445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:26.492202044 CET50448445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:26.497030973 CET4455044870.226.142.1192.168.2.7
                                        Jan 14, 2025 23:02:26.845491886 CET4455029163.48.67.1192.168.2.7
                                        Jan 14, 2025 23:02:26.845706940 CET50291445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:26.845844030 CET50291445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:26.845906973 CET50291445192.168.2.763.48.67.1
                                        Jan 14, 2025 23:02:26.850728989 CET4455029163.48.67.1192.168.2.7
                                        Jan 14, 2025 23:02:26.850759983 CET4455029163.48.67.1192.168.2.7
                                        Jan 14, 2025 23:02:27.890558004 CET4455029859.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:27.890728951 CET50298445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:27.890728951 CET50298445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:27.890777111 CET50298445192.168.2.759.130.120.1
                                        Jan 14, 2025 23:02:27.895680904 CET4455029859.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:27.895709038 CET4455029859.130.120.1192.168.2.7
                                        Jan 14, 2025 23:02:27.956089020 CET50493445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:27.961119890 CET4455049359.130.120.2192.168.2.7
                                        Jan 14, 2025 23:02:27.961253881 CET50493445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:27.961349964 CET50493445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:27.961739063 CET50494445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:27.966265917 CET4455049359.130.120.2192.168.2.7
                                        Jan 14, 2025 23:02:27.966346979 CET50493445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:27.966615915 CET4455049459.130.120.2192.168.2.7
                                        Jan 14, 2025 23:02:27.966686010 CET50494445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:27.966730118 CET50494445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:27.971524000 CET4455049459.130.120.2192.168.2.7
                                        Jan 14, 2025 23:02:28.190046072 CET50506445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:28.195018053 CET44550506149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:28.195210934 CET50506445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:28.195255995 CET50506445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:28.200086117 CET44550506149.20.247.1192.168.2.7
                                        Jan 14, 2025 23:02:28.345623970 CET44550304126.112.145.1192.168.2.7
                                        Jan 14, 2025 23:02:28.345757008 CET50304445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:28.345803022 CET50304445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:28.345849037 CET50304445192.168.2.7126.112.145.1
                                        Jan 14, 2025 23:02:28.350940943 CET44550304126.112.145.1192.168.2.7
                                        Jan 14, 2025 23:02:28.350977898 CET44550304126.112.145.1192.168.2.7
                                        Jan 14, 2025 23:02:29.800946951 CET4455031559.193.85.1192.168.2.7
                                        Jan 14, 2025 23:02:29.801023006 CET50315445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:29.827109098 CET44550316152.147.57.1192.168.2.7
                                        Jan 14, 2025 23:02:29.827176094 CET50316445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:30.547887087 CET50325445192.168.2.7141.193.184.2
                                        Jan 14, 2025 23:02:30.547951937 CET50407445192.168.2.7130.143.132.1
                                        Jan 14, 2025 23:02:30.547992945 CET50398445192.168.2.7140.192.249.2
                                        Jan 14, 2025 23:02:30.548032999 CET50353445192.168.2.779.169.8.2
                                        Jan 14, 2025 23:02:30.548077106 CET50334445192.168.2.7198.110.238.2
                                        Jan 14, 2025 23:02:30.548118114 CET50363445192.168.2.7207.147.9.2
                                        Jan 14, 2025 23:02:30.548163891 CET50344445192.168.2.799.232.202.2
                                        Jan 14, 2025 23:02:30.548209906 CET50315445192.168.2.759.193.85.1
                                        Jan 14, 2025 23:02:30.548224926 CET50316445192.168.2.7152.147.57.1
                                        Jan 14, 2025 23:02:30.548244953 CET50319445192.168.2.7130.184.107.1
                                        Jan 14, 2025 23:02:30.548297882 CET50320445192.168.2.758.100.254.1
                                        Jan 14, 2025 23:02:30.548297882 CET50323445192.168.2.7206.169.28.1
                                        Jan 14, 2025 23:02:30.548317909 CET50328445192.168.2.7132.251.70.1
                                        Jan 14, 2025 23:02:30.548372984 CET50332445192.168.2.7109.143.164.1
                                        Jan 14, 2025 23:02:30.548384905 CET50329445192.168.2.7102.252.16.1
                                        Jan 14, 2025 23:02:30.548413038 CET50338445192.168.2.767.118.253.1
                                        Jan 14, 2025 23:02:30.548410892 CET50337445192.168.2.7219.56.238.1
                                        Jan 14, 2025 23:02:30.548434973 CET50342445192.168.2.7182.19.215.1
                                        Jan 14, 2025 23:02:30.548464060 CET50347445192.168.2.759.243.164.1
                                        Jan 14, 2025 23:02:30.548477888 CET50348445192.168.2.7221.226.81.1
                                        Jan 14, 2025 23:02:30.548499107 CET50351445192.168.2.7167.178.222.1
                                        Jan 14, 2025 23:02:30.548521042 CET50356445192.168.2.754.79.81.1
                                        Jan 14, 2025 23:02:30.548552990 CET50366445192.168.2.7148.67.37.1
                                        Jan 14, 2025 23:02:30.548573017 CET50358445192.168.2.7102.242.240.1
                                        Jan 14, 2025 23:02:30.548625946 CET50382445192.168.2.753.1.126.1
                                        Jan 14, 2025 23:02:30.548652887 CET50376445192.168.2.739.80.197.2
                                        Jan 14, 2025 23:02:30.548722029 CET50448445192.168.2.770.226.142.1
                                        Jan 14, 2025 23:02:30.548827887 CET50494445192.168.2.759.130.120.2
                                        Jan 14, 2025 23:02:30.548880100 CET50506445192.168.2.7149.20.247.1
                                        Jan 14, 2025 23:02:30.549300909 CET50433445192.168.2.771.53.117.2
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 23:01:20.733320951 CET123123192.168.2.720.101.57.9
                                        Jan 14, 2025 23:01:21.012875080 CET12312320.101.57.9192.168.2.7
                                        Jan 14, 2025 23:01:21.914964914 CET5512353192.168.2.71.1.1.1
                                        Jan 14, 2025 23:01:22.068334103 CET53551231.1.1.1192.168.2.7
                                        Jan 14, 2025 23:01:22.687971115 CET6109253192.168.2.71.1.1.1
                                        Jan 14, 2025 23:01:23.015113115 CET53610921.1.1.1192.168.2.7
                                        Jan 14, 2025 23:02:14.998446941 CET138138192.168.2.7192.168.2.255
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 14, 2025 23:01:21.914964914 CET192.168.2.71.1.1.10xb9abStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                        Jan 14, 2025 23:01:22.687971115 CET192.168.2.71.1.1.10x9d26Standard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 14, 2025 23:01:22.068334103 CET1.1.1.1192.168.2.70xb9abNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                        Jan 14, 2025 23:01:23.015113115 CET1.1.1.1192.168.2.70x9d26No error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                        Jan 14, 2025 23:01:23.015113115 CET1.1.1.1192.168.2.70x9d26No error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                        • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749705103.224.212.215807532C:\Windows\mssecsvr.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 23:01:22.080096006 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 23:01:22.671039104 CET365INHTTP/1.1 302 Found
                                        date: Tue, 14 Jan 2025 22:01:22 GMT
                                        server: Apache
                                        set-cookie: __tad=1736892082.2055222; expires=Fri, 12-Jan-2035 22:01:22 GMT; Max-Age=315360000
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-22d6-8491-861bb1f7c202
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.749707199.59.243.228807532C:\Windows\mssecsvr.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 23:01:23.022124052 CET169OUTGET /?subid1=20250115-0901-22d6-8491-861bb1f7c202 HTTP/1.1
                                        Cache-Control: no-cache
                                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Connection: Keep-Alive
                                        Jan 14, 2025 23:01:23.475541115 CET1236INHTTP/1.1 200 OK
                                        date: Tue, 14 Jan 2025 22:01:22 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: da1960cc-605f-446a-be7b-4e08db166a04
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_aYH5ztsFtJ4E1XHCMtw41BD0jm0wmAfXpK5TjcZtQOkQvwVCtpqstxFrGPVxpFOBStbcC2TBH1qzNyYiTacI+w==
                                        set-cookie: parking_session=da1960cc-605f-446a-be7b-4e08db166a04; expires=Tue, 14 Jan 2025 22:16:23 GMT; path=/
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 61 59 48 35 7a 74 73 46 74 4a 34 45 31 58 48 43 4d 74 77 34 31 42 44 30 6a 6d 30 77 6d 41 66 58 70 4b 35 54 6a 63 5a 74 51 4f 6b 51 76 77 56 43 74 70 71 73 74 78 46 72 47 50 56 78 70 46 4f 42 53 74 62 63 43 32 54 42 48 31 71 7a 4e 79 59 69 54 61 63 49 2b 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_aYH5ztsFtJ4E1XHCMtw41BD0jm0wmAfXpK5TjcZtQOkQvwVCtpqstxFrGPVxpFOBStbcC2TBH1qzNyYiTacI+w==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                        Jan 14, 2025 23:01:23.475580931 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                        Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZGExOTYwY2MtNjA1Zi00NDZhLWJlN2ItNGUwOGRiMTY2YTA0IiwicGFnZV90aW1lIjoxNzM2ODkyMDgzLCJwYWdlX3VybCI6I


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.749713103.224.212.215807648C:\Windows\mssecsvr.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 23:01:24.591661930 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Cache-Control: no-cache
                                        Jan 14, 2025 23:01:25.242415905 CET365INHTTP/1.1 302 Found
                                        date: Tue, 14 Jan 2025 22:01:25 GMT
                                        server: Apache
                                        set-cookie: __tad=1736892085.2689601; expires=Fri, 12-Jan-2035 22:01:25 GMT; Max-Age=315360000
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-2581-9013-e164d1a0f19b
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.749714103.224.212.215807732C:\Windows\mssecsvr.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 23:01:24.711371899 CET134OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Cache-Control: no-cache
                                        Cookie: __tad=1736892082.2055222
                                        Jan 14, 2025 23:01:25.350713968 CET269INHTTP/1.1 302 Found
                                        date: Tue, 14 Jan 2025 22:01:25 GMT
                                        server: Apache
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0901-251a-92a0-3fc33577b467
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.749715199.59.243.228807648C:\Windows\mssecsvr.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 23:01:25.251307011 CET169OUTGET /?subid1=20250115-0901-2581-9013-e164d1a0f19b HTTP/1.1
                                        Cache-Control: no-cache
                                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Connection: Keep-Alive
                                        Jan 14, 2025 23:01:25.716434956 CET1236INHTTP/1.1 200 OK
                                        date: Tue, 14 Jan 2025 22:01:25 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: 10e28ea9-42b9-40b7-91af-7d05cb6e341d
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ms8sstjClFy6j8mo7Dm5+05morFtSdSklhex6YIfvHmESbIdleLVsHcxOBhA5TJyBcambhOQ0CLZP/Njf7UH2g==
                                        set-cookie: parking_session=10e28ea9-42b9-40b7-91af-7d05cb6e341d; expires=Tue, 14 Jan 2025 22:16:25 GMT; path=/
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6d 73 38 73 73 74 6a 43 6c 46 79 36 6a 38 6d 6f 37 44 6d 35 2b 30 35 6d 6f 72 46 74 53 64 53 6b 6c 68 65 78 36 59 49 66 76 48 6d 45 53 62 49 64 6c 65 4c 56 73 48 63 78 4f 42 68 41 35 54 4a 79 42 63 61 6d 62 68 4f 51 30 43 4c 5a 50 2f 4e 6a 66 37 55 48 32 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ms8sstjClFy6j8mo7Dm5+05morFtSdSklhex6YIfvHmESbIdleLVsHcxOBhA5TJyBcambhOQ0CLZP/Njf7UH2g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                        Jan 14, 2025 23:01:25.716480970 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                        Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMTBlMjhlYTktNDJiOS00MGI3LTkxYWYtN2QwNWNiNmUzNDFkIiwicGFnZV90aW1lIjoxNzM2ODkyMDg1LCJwYWdlX3VybCI6I


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.749716199.59.243.228807732C:\Windows\mssecsvr.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 14, 2025 23:01:25.363534927 CET231OUTGET /?subid1=20250115-0901-251a-92a0-3fc33577b467 HTTP/1.1
                                        Cache-Control: no-cache
                                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Connection: Keep-Alive
                                        Cookie: parking_session=da1960cc-605f-446a-be7b-4e08db166a04
                                        Jan 14, 2025 23:01:25.824352026 CET1236INHTTP/1.1 200 OK
                                        date: Tue, 14 Jan 2025 22:01:25 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: cec769e2-5bc0-46aa-81e8-04e566204af1
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_GjIux4AEXJ9ZPWhL2ql2nqALh34CHZSvwO9yYTXRzeB1e2Y+ryWwtEfOGOo7Bzj+lBTgn0naaezNY0363JabGQ==
                                        set-cookie: parking_session=da1960cc-605f-446a-be7b-4e08db166a04; expires=Tue, 14 Jan 2025 22:16:25 GMT
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 47 6a 49 75 78 34 41 45 58 4a 39 5a 50 57 68 4c 32 71 6c 32 6e 71 41 4c 68 33 34 43 48 5a 53 76 77 4f 39 79 59 54 58 52 7a 65 42 31 65 32 59 2b 72 79 57 77 74 45 66 4f 47 4f 6f 37 42 7a 6a 2b 6c 42 54 67 6e 30 6e 61 61 65 7a 4e 59 30 33 36 33 4a 61 62 47 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_GjIux4AEXJ9ZPWhL2ql2nqALh34CHZSvwO9yYTXRzeB1e2Y+ryWwtEfOGOo7Bzj+lBTgn0naaezNY0363JabGQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                        Jan 14, 2025 23:01:25.824409008 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                        Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZGExOTYwY2MtNjA1Zi00NDZhLWJlN2ItNGUwOGRiMTY2YTA0IiwicGFnZV90aW1lIjoxNzM2ODkyMDg1LCJwYWdlX3VybCI6Imh0dHA6L


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:17:01:20
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\loaddll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:loaddll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll"
                                        Imagebase:0x8f0000
                                        File size:126'464 bytes
                                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:1
                                        Start time:17:01:20
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff75da10000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:17:01:20
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1
                                        Imagebase:0x410000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:17:01:20
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe C:\Users\user\Desktop\sLlAsC4I5r.dll,PlayGame
                                        Imagebase:0x5c0000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:17:01:20
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",#1
                                        Imagebase:0x5c0000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:17:01:20
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvr.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvr.exe
                                        Imagebase:0x400000
                                        File size:2'281'472 bytes
                                        MD5 hash:7FB008D5D5B7287BE887984844A4AC41
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1336491510.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:7
                                        Start time:17:01:22
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvr.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                        Imagebase:0x400000
                                        File size:2'281'472 bytes
                                        MD5 hash:7FB008D5D5B7287BE887984844A4AC41
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.1357140442.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2015410106.000000000227D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2015123751.0000000001D59000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:8
                                        Start time:17:01:23
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\sLlAsC4I5r.dll",PlayGame
                                        Imagebase:0x5c0000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:17:01:23
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvr.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvr.exe
                                        Imagebase:0x400000
                                        File size:2'281'472 bytes
                                        MD5 hash:7FB008D5D5B7287BE887984844A4AC41
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1378591463.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1365489627.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:71.7%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:63.2%
                                          Total number of Nodes:38
                                          Total number of Limit Nodes:9
                                          execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBD0EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                          • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                          • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                          • CreateProcessA.KERNELBASE ref: 00407EE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                          • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1377189927.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1377173915.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377210942.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377280026.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377366936.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4281112323-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1377189927.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1377173915.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377210942.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377280026.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377366936.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1377189927.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1377173915.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377210942.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377280026.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377366936.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          • API String ID: 774561529-2614457033
                                          • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                          • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBD0EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1377189927.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1377173915.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377210942.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377280026.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377366936.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                          • API String ID: 3340711343-2450984573
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6FBD0EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1377189927.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.1377173915.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377210942.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377230250.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377280026.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.1377366936.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.1
                                          • API String ID: 4274534310-2839763450
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Execution Graph

                                          Execution Coverage:34.8%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:0%
                                          Total number of Nodes:36
                                          Total number of Limit Nodes:2

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6FBD0EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2014128224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000007.00000002.2014109618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014147791.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014227844.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014245603.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014362748.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.1
                                          • API String ID: 4274534310-2839763450
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2014128224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000007.00000002.2014109618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014147791.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014227844.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014245603.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014362748.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          • API String ID: 774561529-2614457033
                                          • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                          • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                          • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBD0EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2014128224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000007.00000002.2014109618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014147791.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014227844.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014245603.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014362748.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                          • API String ID: 3340711343-2450984573
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBD0EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2014128224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000007.00000002.2014109618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014147791.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014227844.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014245603.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014362748.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4072214828-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2014128224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000007.00000002.2014109618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014147791.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014164274.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014209867.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014227844.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014245603.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000007.00000002.2014362748.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59