Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
D3W41IdtQA.dll

Overview

General Information

Sample name:D3W41IdtQA.dll
renamed because original name is a hash value
Original sample name:fdcac773c1bae1197a3b30bc0e44bf4d.dll
Analysis ID:1591388
MD5:fdcac773c1bae1197a3b30bc0e44bf4d
SHA1:11c157aa6e5e81f06b4075da79ba6871c8d99362
SHA256:2bb25bfd55561e547c27fce2e29208f5255e3e121ff405ad154ad413fda59b20
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2800 cmdline: loaddll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4612 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5052 cmdline: rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvr.exe (PID: 6052 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 8FFE5EAA2C7E7B68B68F70F7B2456C42)
    • rundll32.exe (PID: 5348 cmdline: rundll32.exe C:\Users\user\Desktop\D3W41IdtQA.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2796 cmdline: rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 3252 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 8FFE5EAA2C7E7B68B68F70F7B2456C42)
  • mssecsvr.exe (PID: 3480 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: 8FFE5EAA2C7E7B68B68F70F7B2456C42)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
D3W41IdtQA.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    D3W41IdtQA.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    D3W41IdtQA.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      SourceRuleDescriptionAuthorStrings
      00000007.00000000.2078455711.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000007.00000000.2078571904.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000007.00000000.2078571904.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000009.00000000.2087741306.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              9.2.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xe8d8:$x3: tasksche.exe
              • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xe92c:$x5: WNcry@2ol7
              • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xe82c:$s3: cmd.exe /c "%s"
              9.2.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              9.2.mssecsvr.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                9.2.mssecsvr.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                9.2.mssecsvr.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                Click to see the 87 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T23:34:07.495531+010028033043Unknown Traffic192.168.2.549704103.224.212.21580TCP
                2025-01-14T23:34:09.108444+010028033043Unknown Traffic192.168.2.549706103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T23:34:06.539483+010028300181A Network Trojan was detected192.168.2.5548041.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: D3W41IdtQA.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033a7Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd529fAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d9Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d94bAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd52Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/.=Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033Avira URL Cloud: Label: malware
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 82%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 82%
                Source: D3W41IdtQA.dllReversingLabs: Detection: 88%
                Source: D3W41IdtQA.dllVirustotal: Detection: 91%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: D3W41IdtQA.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: D3W41IdtQA.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.5:54804 -> 1.1.1.1:53
                Source: global trafficTCP traffic: 192.168.2.5:53091 -> 162.159.36.2:53
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0934-0711-a4e9-cbca1637d94b HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0934-0970-8cc9-73b029fd529f HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736894047.2350906
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0934-09e1-a4d8-9386228033a7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=85d71e1c-462c-4976-95fa-24291f75e090
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49706 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49704 -> 103.224.212.215:80
                Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.236
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.236
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.236
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.236
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.1
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.1
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.1
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.1
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.1
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.1
                Source: unknownTCP traffic detected without corresponding DNS query: 22.33.251.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.19
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.19
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.19
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.1
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.1
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.19
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.1
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.1
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.1
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.1
                Source: unknownTCP traffic detected without corresponding DNS query: 69.124.198.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.5
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.5
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.5
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.1
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.5
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.1
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.1
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.1
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.1
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.1
                Source: unknownTCP traffic detected without corresponding DNS query: 58.192.79.1
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.177
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.177
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.177
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.1
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.1
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.1
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.1
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.177
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.1
                Source: unknownTCP traffic detected without corresponding DNS query: 163.33.155.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0934-0711-a4e9-cbca1637d94b HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0934-0970-8cc9-73b029fd529f HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736894047.2350906
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0934-09e1-a4d8-9386228033a7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=85d71e1c-462c-4976-95fa-24291f75e090
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
                Source: mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/.=
                Source: mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d9
                Source: mssecsvr.exe, 00000007.00000002.2727735828.0000000000A8B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000003.2091989361.0000000000A7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd52
                Source: mssecsvr.exe, 00000009.00000002.2100882934.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033
                Source: D3W41IdtQA.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000005.00000002.2093415312.00000000009CE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2100882934.0000000000ACE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2100882934.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2100882934.0000000000AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000005.00000002.2093415312.00000000009CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/5
                Source: mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/;
                Source: mssecsvr.exe, 00000009.00000002.2100882934.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/c
                Source: mssecsvr.exe, 00000007.00000002.2727735828.0000000000A6A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000003.2091989361.0000000000A7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/o
                Source: mssecsvr.exe, 00000007.00000002.2727735828.0000000000A6A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000003.2091989361.0000000000A7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/r
                Source: mssecsvr.exe, 00000009.00000002.2100882934.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com?
                Source: mssecsvr.exe, 00000007.00000002.2727355330.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvr.exe, 00000005.00000002.2093415312.00000000009CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comi
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: D3W41IdtQA.dll, type: SAMPLE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.22a196c.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d7a128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d57104.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.227e948.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d48084.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.226f8c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d57104.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.227e948.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.227a8e8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.mssecsvr.exe.1d530a4.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000000.2078455711.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000000.2078571904.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000000.2087741306.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2100631986.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2727456117.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.2059116845.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2100501122.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000000.2087872787.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2728292816.000000000227E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.2059281038.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2728081157.0000000001D57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6052, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 3480, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 3252, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                System Summary

                barindex
                Source: D3W41IdtQA.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: D3W41IdtQA.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.1d7a128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d7a128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.226f8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.22a196c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.22a196c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.1d48084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.22a196c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.22a196c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.1d7a128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d7a128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.1d57104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d57104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.1d57104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.227e948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.227e948.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.227e948.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.1d48084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d48084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.226f8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.226f8c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.1d57104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d57104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.227e948.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.227e948.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.227a8e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.227a8e8.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 7.2.mssecsvr.exe.1d530a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 7.2.mssecsvr.exe.1d530a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000007.00000000.2078571904.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000002.2100631986.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000009.00000000.2087872787.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000007.00000002.2728292816.000000000227E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000000.2059281038.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000007.00000002.2728081157.0000000001D57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) F5D803CFAC34984BA4083EFE107652B387B5F807B84B9CF15B255CA59287DCB9
                Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe F5D803CFAC34984BA4083EFE107652B387B5F807B84B9CF15B255CA59287DCB9
                Source: tasksche.exe.5.drStatic PE information: No import functions for PE file found
                Source: D3W41IdtQA.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: D3W41IdtQA.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: D3W41IdtQA.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.1d7a128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d7a128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.226f8c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.22a196c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.22a196c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.1d48084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.22a196c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.22a196c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.1d7a128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d7a128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.1d57104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d57104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.1d57104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.227e948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.227e948.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.227e948.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.1d48084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d48084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.226f8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.226f8c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 9.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.1d57104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d57104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.227e948.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.227e948.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.227a8e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.227a8e8.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 7.2.mssecsvr.exe.1d530a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 7.2.mssecsvr.exe.1d530a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000007.00000000.2078571904.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000002.2100631986.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000009.00000000.2087872787.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000007.00000002.2728292816.000000000227E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000000.2059281038.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000007.00000002.2728081157.0000000001D57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: tasksche.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: tasksche.exe.5.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                Source: tasksche.exe.5.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                Source: tasksche.exe.5.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                Source: D3W41IdtQA.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@3/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5900:120:WilError_03
                Source: D3W41IdtQA.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D3W41IdtQA.dll,PlayGame
                Source: D3W41IdtQA.dllReversingLabs: Detection: 88%
                Source: D3W41IdtQA.dllVirustotal: Detection: 91%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D3W41IdtQA.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D3W41IdtQA.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: D3W41IdtQA.dllStatic file information: File size 5267459 > 1048576
                Source: D3W41IdtQA.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: tasksche.exe.5.drStatic PE information: section name: .text entropy: 7.663042758896975

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exe TID: 1856Thread sleep count: 97 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 1856Thread sleep time: -194000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 2824Thread sleep count: 126 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 2824Thread sleep count: 39 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 1856Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvr.exe, 00000009.00000002.2100882934.0000000000AEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6
                Source: mssecsvr.exe, 00000005.00000002.2093415312.0000000000A29000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.2093415312.00000000009F9000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000003.2091989361.0000000000A8B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000002.2727735828.0000000000A8B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2100882934.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000009.00000002.2100882934.0000000000AEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvr.exe, 00000007.00000002.2727735828.0000000000A48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWHx
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1Jump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591388 Sample: D3W41IdtQA.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 36 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->38 40 2 other IPs or domains 2->40 48 Suricata IDS alerts for network traffic 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for URL or domain 2->52 54 7 other signatures 2->54 9 loaddll32.exe 1 2->9         started        11 mssecsvr.exe 12 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        18 cmd.exe 1 9->18         started        20 conhost.exe 9->20         started        22 rundll32.exe 1 9->22         started        42 192.168.2.102 unknown unknown 11->42 44 192.168.2.103 unknown unknown 11->44 46 98 other IPs or domains 11->46 56 Connects to many different private IPs via SMB (likely to spread or exploit) 11->56 58 Connects to many different private IPs (likely to spread or exploit) 11->58 signatures6 process7 signatures8 60 Drops executables to the windows directory (C:\Windows) and starts them 15->60 24 mssecsvr.exe 13 15->24         started        27 rundll32.exe 18->27         started        process9 file10 32 C:\WINDOWS\qeriuwjhrf (copy), PE32 24->32 dropped 29 mssecsvr.exe 13 27->29         started        process11 file12 34 C:\Windows\tasksche.exe, PE32 29->34 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                D3W41IdtQA.dll88%ReversingLabsWin32.Ransomware.WannaCry
                D3W41IdtQA.dll92%VirustotalBrowse
                D3W41IdtQA.dll100%AviraTR/AD.WannaCry.ghwow
                D3W41IdtQA.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)83%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe83%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comi0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033a7100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd529f100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d9100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d94b100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd52100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/.=100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    high
                    15.164.165.52.in-addr.arpa
                    unknown
                    unknownfalse
                      high
                      ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033a7false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d94bfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                          high
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd529ffalse
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/omssecsvr.exe, 00000007.00000002.2727735828.0000000000A6A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000003.2091989361.0000000000A7C000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comD3W41IdtQA.dllfalse
                              high
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d9mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/cmssecsvr.exe, 00000009.00000002.2100882934.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comimssecsvr.exe, 00000005.00000002.2093415312.00000000009CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/;mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000007.00000002.2727355330.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    high
                                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033mssecsvr.exe, 00000009.00000002.2100882934.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/5mssecsvr.exe, 00000005.00000002.2093415312.00000000009CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/rmssecsvr.exe, 00000007.00000002.2727735828.0000000000A6A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000003.2091989361.0000000000A7C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd52mssecsvr.exe, 00000007.00000002.2727735828.0000000000A8B000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000007.00000003.2091989361.0000000000A7C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com?mssecsvr.exe, 00000009.00000002.2100882934.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/.=mssecsvr.exe, 00000005.00000002.2093415312.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          160.234.246.195
                                          unknownunknown
                                          11259ANGOLATELECOMAOfalse
                                          198.241.75.224
                                          unknownUnited States
                                          14242AS-NETBLK-COCUSfalse
                                          124.94.33.112
                                          unknownChina
                                          4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                          153.5.218.1
                                          unknownSlovenia
                                          2107ARNES-NETAcademicandResearchNetworkofSloveniaSIfalse
                                          133.205.133.214
                                          unknownJapan2518BIGLOBEBIGLOBEIncJPfalse
                                          160.234.246.1
                                          unknownunknown
                                          11259ANGOLATELECOMAOfalse
                                          161.190.209.78
                                          unknownArgentina
                                          13474BancodeGaliciayBuenosAiresARfalse
                                          60.43.125.1
                                          unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                          194.204.94.1
                                          unknownSwitzerland
                                          30862ATOS-CH-ASCHfalse
                                          119.11.25.6
                                          unknownAustralia
                                          133612VODAFONE-AS-APVodafoneAustraliaPtyLtdAUfalse
                                          190.175.99.1
                                          unknownArgentina
                                          22927TelefonicadeArgentinaARfalse
                                          145.214.61.1
                                          unknownNetherlands
                                          1101IP-EEND-ASIP-EENDBVNLfalse
                                          58.192.79.1
                                          unknownChina
                                          4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                          58.192.79.2
                                          unknownChina
                                          4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                          164.159.211.1
                                          unknownUnited States
                                          22284AS22284-DOI-OPSUSfalse
                                          58.192.79.5
                                          unknownChina
                                          4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                          108.170.252.106
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          69.170.172.1
                                          unknownUnited States
                                          32035CCDT-ASUSfalse
                                          202.122.32.233
                                          unknownChina
                                          7497CSTNET-AS-APComputerNetworkInformationCenterCNfalse
                                          123.102.22.1
                                          unknownAustralia
                                          4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                          IP
                                          192.168.2.148
                                          192.168.2.149
                                          192.168.2.146
                                          192.168.2.147
                                          192.168.2.140
                                          192.168.2.141
                                          192.168.2.144
                                          192.168.2.145
                                          192.168.2.142
                                          192.168.2.143
                                          192.168.2.159
                                          192.168.2.157
                                          192.168.2.158
                                          192.168.2.151
                                          192.168.2.152
                                          192.168.2.150
                                          192.168.2.155
                                          192.168.2.156
                                          192.168.2.153
                                          192.168.2.154
                                          192.168.2.126
                                          192.168.2.247
                                          192.168.2.127
                                          192.168.2.248
                                          192.168.2.124
                                          192.168.2.245
                                          192.168.2.125
                                          192.168.2.246
                                          192.168.2.128
                                          192.168.2.249
                                          192.168.2.129
                                          192.168.2.240
                                          192.168.2.122
                                          192.168.2.243
                                          192.168.2.123
                                          192.168.2.244
                                          192.168.2.120
                                          192.168.2.241
                                          192.168.2.121
                                          192.168.2.242
                                          192.168.2.97
                                          192.168.2.137
                                          192.168.2.96
                                          192.168.2.138
                                          192.168.2.99
                                          192.168.2.135
                                          192.168.2.98
                                          192.168.2.136
                                          192.168.2.139
                                          192.168.2.250
                                          192.168.2.130
                                          192.168.2.251
                                          192.168.2.91
                                          192.168.2.90
                                          192.168.2.93
                                          192.168.2.133
                                          192.168.2.254
                                          192.168.2.92
                                          192.168.2.134
                                          192.168.2.95
                                          192.168.2.131
                                          192.168.2.252
                                          192.168.2.94
                                          192.168.2.132
                                          192.168.2.253
                                          192.168.2.104
                                          192.168.2.225
                                          192.168.2.105
                                          192.168.2.226
                                          192.168.2.102
                                          192.168.2.223
                                          192.168.2.103
                                          192.168.2.224
                                          192.168.2.108
                                          192.168.2.229
                                          192.168.2.109
                                          192.168.2.106
                                          192.168.2.227
                                          192.168.2.107
                                          192.168.2.228
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1591388
                                          Start date and time:2025-01-14 23:33:13 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 5m 17s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:12
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:D3W41IdtQA.dll
                                          renamed because original name is a hash value
                                          Original Sample Name:fdcac773c1bae1197a3b30bc0e44bf4d.dll
                                          Detection:MAL
                                          Classification:mal100.rans.expl.evad.winDLL@18/2@3/100
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:Failed
                                          Cookbook Comments:
                                          • Found application associated with file extension: .dll
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 199.232.214.172, 2.17.190.73, 13.107.246.45, 4.245.163.56, 52.165.164.15, 52.149.20.212
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          17:34:08API Interceptor1x Sleep call for process: loaddll32.exe modified
                                          17:34:43API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          77026.bodis.comF1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comF1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ARNES-NETAcademicandResearchNetworkofSloveniaSIhttps://bonnpwqy.blogspot.com/Get hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                          • 193.3.19.74
                                          https://rinderynitvye.blogspot.com/Get hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                          • 193.3.19.74
                                          miori.arm.elfGet hashmaliciousUnknownBrowse
                                          • 109.127.255.133
                                          https://bit.ly/3VYGxmhGet hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                          • 193.3.19.63
                                          fuckunix.sh4.elfGet hashmaliciousMiraiBrowse
                                          • 95.87.163.30
                                          markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 193.3.19.151
                                          utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 193.3.19.151
                                          armv7l.elfGet hashmaliciousUnknownBrowse
                                          • 149.62.103.197
                                          iviewers.dllGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 193.3.19.151
                                          script.ps1Get hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 193.3.19.151
                                          CHINA169-BACKBONECHINAUNICOMChina169BackboneCNsLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                          • 39.80.197.203
                                          ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                          • 27.219.109.201
                                          eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                          • 182.119.252.121
                                          Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                          • 42.63.214.1
                                          9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                                          • 27.11.108.236
                                          mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                          • 39.74.29.1
                                          mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                          • 116.178.208.121
                                          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                          • 61.167.78.49
                                          meth10.elfGet hashmaliciousMiraiBrowse
                                          • 60.16.183.30
                                          meth3.elfGet hashmaliciousMiraiBrowse
                                          • 157.2.250.223
                                          ANGOLATELECOMAOmeth7.elfGet hashmaliciousMiraiBrowse
                                          • 197.216.246.233
                                          elitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 197.217.148.152
                                          3.elfGet hashmaliciousUnknownBrowse
                                          • 197.217.236.126
                                          3.elfGet hashmaliciousUnknownBrowse
                                          • 160.236.42.51
                                          5.elfGet hashmaliciousUnknownBrowse
                                          • 160.225.206.82
                                          3.elfGet hashmaliciousUnknownBrowse
                                          • 197.217.101.163
                                          3.elfGet hashmaliciousUnknownBrowse
                                          • 197.217.236.158
                                          Fantazy.x86.elfGet hashmaliciousUnknownBrowse
                                          • 160.224.189.110
                                          sora.mips.elfGet hashmaliciousUnknownBrowse
                                          • 160.241.234.5
                                          6.elfGet hashmaliciousUnknownBrowse
                                          • 197.217.101.144
                                          AS-NETBLK-COCUSjew.ppc.elfGet hashmaliciousUnknownBrowse
                                          • 198.241.106.85
                                          i586.elfGet hashmaliciousUnknownBrowse
                                          • 198.241.72.113
                                          la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                          • 198.241.118.57
                                          na.elfGet hashmaliciousMiraiBrowse
                                          • 198.241.106.93
                                          na.elfGet hashmaliciousMiraiBrowse
                                          • 198.241.94.215
                                          EWqGQSXGXE.elfGet hashmaliciousMiraiBrowse
                                          • 198.241.118.61
                                          w4Jz8NeRDg.elfGet hashmaliciousMiraiBrowse
                                          • 198.241.119.125
                                          sora.armGet hashmaliciousMiraiBrowse
                                          • 198.241.106.95
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\WINDOWS\qeriuwjhrf (copy)Lsw2Eccslw.dllGet hashmaliciousWannacryBrowse
                                            C:\Windows\tasksche.exeLsw2Eccslw.dllGet hashmaliciousWannacryBrowse
                                              Process:C:\Windows\mssecsvr.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):2061938
                                              Entropy (8bit):6.892941721428807
                                              Encrypted:false
                                              SSDEEP:49152:SEMSPbcBVQejy+TSqTdX1HkQo6SAARdhnr:ZPoBhOcSUDk36SAEdhr
                                              MD5:3F2ADB09EAFA948E37AFF583456E5CA6
                                              SHA1:75FCB7D65348AF54E34DC85B6A9CC9215897B569
                                              SHA-256:F5D803CFAC34984BA4083EFE107652B387B5F807B84B9CF15B255CA59287DCB9
                                              SHA-512:6822D277E66D6532AF802531C8FB71D7559AF3CCB5742DFD2C76A806907C786CA324933E2AEB856015F2F5A3628F74E178B878FB053AECF07BE8B19F2A6EC19E
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 83%
                                              Joe Sandbox View:
                                              • Filename: Lsw2Eccslw.dll, Detection: malicious, Browse
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\mssecsvr.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):2061938
                                              Entropy (8bit):6.892941721428807
                                              Encrypted:false
                                              SSDEEP:49152:SEMSPbcBVQejy+TSqTdX1HkQo6SAARdhnr:ZPoBhOcSUDk36SAEdhr
                                              MD5:3F2ADB09EAFA948E37AFF583456E5CA6
                                              SHA1:75FCB7D65348AF54E34DC85B6A9CC9215897B569
                                              SHA-256:F5D803CFAC34984BA4083EFE107652B387B5F807B84B9CF15B255CA59287DCB9
                                              SHA-512:6822D277E66D6532AF802531C8FB71D7559AF3CCB5742DFD2C76A806907C786CA324933E2AEB856015F2F5A3628F74E178B878FB053AECF07BE8B19F2A6EC19E
                                              Malicious:true
                                              Yara Hits:
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                              • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 83%
                                              Joe Sandbox View:
                                              • Filename: Lsw2Eccslw.dll, Detection: malicious, Browse
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):3.541772688125557
                                              TrID:
                                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                              • Generic Win/DOS Executable (2004/3) 0.20%
                                              • DOS Executable Generic (2002/1) 0.20%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:D3W41IdtQA.dll
                                              File size:5'267'459 bytes
                                              MD5:fdcac773c1bae1197a3b30bc0e44bf4d
                                              SHA1:11c157aa6e5e81f06b4075da79ba6871c8d99362
                                              SHA256:2bb25bfd55561e547c27fce2e29208f5255e3e121ff405ad154ad413fda59b20
                                              SHA512:75d6390da0c7a75fbf404d63a67061eec25628f291b34057acf6b3e3acc565600f61aba3e64924759b0e57c8cba7f9c8c9fa3f2dce710e2fe1dc696f3104c6e7
                                              SSDEEP:49152:RnsEMSPbcBVQejy+TSqTdX1HkQo6SAARdhn:1fPoBhOcSUDk36SAEdh
                                              TLSH:BB36239871BC81F8C10929B458A7C636B2B27C6921FE960FDBD09D573D33B45FB90A42
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                              Icon Hash:7ae282899bbab082
                                              Entrypoint:0x100011e9
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x10000000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                              DLL Characteristics:
                                              Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                              Instruction
                                              push ebp
                                              mov ebp, esp
                                              push ebx
                                              mov ebx, dword ptr [ebp+08h]
                                              push esi
                                              mov esi, dword ptr [ebp+0Ch]
                                              push edi
                                              mov edi, dword ptr [ebp+10h]
                                              test esi, esi
                                              jne 00007F88806D7F8Bh
                                              cmp dword ptr [10003140h], 00000000h
                                              jmp 00007F88806D7FA8h
                                              cmp esi, 01h
                                              je 00007F88806D7F87h
                                              cmp esi, 02h
                                              jne 00007F88806D7FA4h
                                              mov eax, dword ptr [10003150h]
                                              test eax, eax
                                              je 00007F88806D7F8Bh
                                              push edi
                                              push esi
                                              push ebx
                                              call eax
                                              test eax, eax
                                              je 00007F88806D7F8Eh
                                              push edi
                                              push esi
                                              push ebx
                                              call 00007F88806D7E9Ah
                                              test eax, eax
                                              jne 00007F88806D7F86h
                                              xor eax, eax
                                              jmp 00007F88806D7FD0h
                                              push edi
                                              push esi
                                              push ebx
                                              call 00007F88806D7D4Ch
                                              cmp esi, 01h
                                              mov dword ptr [ebp+0Ch], eax
                                              jne 00007F88806D7F8Eh
                                              test eax, eax
                                              jne 00007F88806D7FB9h
                                              push edi
                                              push eax
                                              push ebx
                                              call 00007F88806D7E76h
                                              test esi, esi
                                              je 00007F88806D7F87h
                                              cmp esi, 03h
                                              jne 00007F88806D7FA8h
                                              push edi
                                              push esi
                                              push ebx
                                              call 00007F88806D7E65h
                                              test eax, eax
                                              jne 00007F88806D7F85h
                                              and dword ptr [ebp+0Ch], eax
                                              cmp dword ptr [ebp+0Ch], 00000000h
                                              je 00007F88806D7F93h
                                              mov eax, dword ptr [10003150h]
                                              test eax, eax
                                              je 00007F88806D7F8Ah
                                              push edi
                                              push esi
                                              push ebx
                                              call eax
                                              mov dword ptr [ebp+0Ch], eax
                                              mov eax, dword ptr [ebp+0Ch]
                                              pop edi
                                              pop esi
                                              pop ebx
                                              pop ebp
                                              retn 000Ch
                                              jmp dword ptr [10002028h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              Programming Language:
                                              • [ C ] VS98 (6.0) build 8168
                                              • [C++] VS98 (6.0) build 8168
                                              • [RES] VS98 (6.0) cvtres build 1720
                                              • [LNK] VS98 (6.0) imp/exp build 8168
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x40000x5000600x501000639499d4452b5edfd558bd8dc5528183unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              W0x40600x500000dataEnglishUnited States0.8792247772216797
                                              DLLImport
                                              KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                              MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                              NameOrdinalAddress
                                              PlayGame10x10001114
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2025-01-14T23:34:06.539483+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.5548041.1.1.153UDP
                                              2025-01-14T23:34:07.495531+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549704103.224.212.21580TCP
                                              2025-01-14T23:34:09.108444+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549706103.224.212.21580TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 14, 2025 23:34:01.137903929 CET49675443192.168.2.523.1.237.91
                                              Jan 14, 2025 23:34:01.137970924 CET49674443192.168.2.523.1.237.91
                                              Jan 14, 2025 23:34:01.247339964 CET49673443192.168.2.523.1.237.91
                                              Jan 14, 2025 23:34:06.853458881 CET4970480192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:06.858524084 CET8049704103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:06.858606100 CET4970480192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:06.858745098 CET4970480192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:06.863624096 CET8049704103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:07.495368004 CET8049704103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:07.495429039 CET8049704103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:07.495531082 CET4970480192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:07.500386953 CET4970480192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:07.505219936 CET8049704103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:07.835021973 CET4970580192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:07.840054035 CET8049705199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:07.840364933 CET4970580192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:07.840545893 CET4970580192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:07.845426083 CET8049705199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:08.296755075 CET8049705199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:08.296819925 CET8049705199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:08.296960115 CET4970580192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:08.296961069 CET4970580192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:08.302416086 CET4970580192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:08.302416086 CET4970580192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:08.458861113 CET4970680192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:08.463879108 CET8049706103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:08.463973045 CET4970680192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:08.464134932 CET4970680192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:08.468971968 CET8049706103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:09.108202934 CET8049706103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:09.108262062 CET8049706103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:09.108443975 CET4970680192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:09.108443975 CET4970680192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:09.111191988 CET4970680192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:09.112102032 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.116401911 CET8049706103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:09.117468119 CET8049707199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:09.117577076 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.117826939 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.122756004 CET8049707199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:09.395297050 CET4970880192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:09.400718927 CET8049708103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:09.400924921 CET4970880192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:09.401051044 CET4970880192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:09.406322956 CET8049708103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:09.661906004 CET8049707199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:09.661964893 CET8049707199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:09.662003994 CET8049707199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:09.662101984 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.662102938 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.662102938 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.668781996 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.668781996 CET4970780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:09.700109005 CET49709445192.168.2.522.33.251.236
                                              Jan 14, 2025 23:34:09.705248117 CET4454970922.33.251.236192.168.2.5
                                              Jan 14, 2025 23:34:09.705349922 CET49709445192.168.2.522.33.251.236
                                              Jan 14, 2025 23:34:09.706078053 CET49709445192.168.2.522.33.251.236
                                              Jan 14, 2025 23:34:09.710995913 CET4454970922.33.251.236192.168.2.5
                                              Jan 14, 2025 23:34:09.711107016 CET49709445192.168.2.522.33.251.236
                                              Jan 14, 2025 23:34:09.712258101 CET49710445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:09.717180967 CET4454971022.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:09.717262030 CET49710445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:09.717329025 CET49710445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:09.720915079 CET49711445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:09.722606897 CET4454971022.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:09.722662926 CET49710445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:09.725799084 CET4454971122.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:09.725864887 CET49711445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:09.725909948 CET49711445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:09.730741978 CET4454971122.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:10.014123917 CET8049708103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:10.014183998 CET8049708103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:10.014305115 CET4970880192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:10.014305115 CET4970880192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:10.016124964 CET4970880192.168.2.5103.224.212.215
                                              Jan 14, 2025 23:34:10.016942024 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.021230936 CET8049708103.224.212.215192.168.2.5
                                              Jan 14, 2025 23:34:10.022288084 CET8049717199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:10.022365093 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.022483110 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.027369022 CET8049717199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:10.486355066 CET8049717199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:10.486418009 CET8049717199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:10.486690044 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.486690044 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.490458012 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.490458012 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.495932102 CET8049717199.59.243.228192.168.2.5
                                              Jan 14, 2025 23:34:10.496037960 CET4971780192.168.2.5199.59.243.228
                                              Jan 14, 2025 23:34:10.747267008 CET49675443192.168.2.523.1.237.91
                                              Jan 14, 2025 23:34:10.747286081 CET49674443192.168.2.523.1.237.91
                                              Jan 14, 2025 23:34:10.856796026 CET49673443192.168.2.523.1.237.91
                                              Jan 14, 2025 23:34:11.702397108 CET49735445192.168.2.569.124.198.19
                                              Jan 14, 2025 23:34:11.707535982 CET4454973569.124.198.19192.168.2.5
                                              Jan 14, 2025 23:34:11.707631111 CET49735445192.168.2.569.124.198.19
                                              Jan 14, 2025 23:34:11.707676888 CET49735445192.168.2.569.124.198.19
                                              Jan 14, 2025 23:34:11.707854033 CET49736445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:11.712775946 CET4454973669.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:11.712809086 CET4454973569.124.198.19192.168.2.5
                                              Jan 14, 2025 23:34:11.712865114 CET49736445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:11.712882996 CET49735445192.168.2.569.124.198.19
                                              Jan 14, 2025 23:34:11.712945938 CET49736445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:11.713912964 CET49737445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:11.717915058 CET4454973669.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:11.717989922 CET49736445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:11.718832970 CET4454973769.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:11.718913078 CET49737445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:11.719055891 CET49737445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:11.723845959 CET4454973769.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:12.502971888 CET4434970323.1.237.91192.168.2.5
                                              Jan 14, 2025 23:34:12.503226042 CET49703443192.168.2.523.1.237.91
                                              Jan 14, 2025 23:34:13.717722893 CET49759445192.168.2.558.192.79.5
                                              Jan 14, 2025 23:34:13.723206997 CET4454975958.192.79.5192.168.2.5
                                              Jan 14, 2025 23:34:13.723304987 CET49759445192.168.2.558.192.79.5
                                              Jan 14, 2025 23:34:13.723463058 CET49759445192.168.2.558.192.79.5
                                              Jan 14, 2025 23:34:13.727483988 CET49760445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:13.729762077 CET4454975958.192.79.5192.168.2.5
                                              Jan 14, 2025 23:34:13.729933023 CET49759445192.168.2.558.192.79.5
                                              Jan 14, 2025 23:34:13.733859062 CET4454976058.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:13.734095097 CET49760445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:13.734095097 CET49760445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:13.735383987 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:13.741431952 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:13.741544008 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:13.741544008 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:13.745919943 CET4454976058.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:13.748131990 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:13.751473904 CET4454976058.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:13.751677990 CET49760445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:15.732878923 CET49782445192.168.2.5163.33.155.177
                                              Jan 14, 2025 23:34:15.739710093 CET44549782163.33.155.177192.168.2.5
                                              Jan 14, 2025 23:34:15.739794970 CET49782445192.168.2.5163.33.155.177
                                              Jan 14, 2025 23:34:15.739859104 CET49782445192.168.2.5163.33.155.177
                                              Jan 14, 2025 23:34:15.740169048 CET49783445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:15.745320082 CET44549783163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:15.745392084 CET49783445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:15.745451927 CET49783445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:15.745651960 CET44549782163.33.155.177192.168.2.5
                                              Jan 14, 2025 23:34:15.746541977 CET49784445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:15.751555920 CET44549782163.33.155.177192.168.2.5
                                              Jan 14, 2025 23:34:15.751610041 CET44549783163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:15.751610994 CET49782445192.168.2.5163.33.155.177
                                              Jan 14, 2025 23:34:15.751668930 CET49783445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:15.751979113 CET44549784163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:15.752051115 CET49784445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:15.752089977 CET49784445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:15.756961107 CET44549784163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:17.748210907 CET49806445192.168.2.5115.64.228.169
                                              Jan 14, 2025 23:34:17.753403902 CET44549806115.64.228.169192.168.2.5
                                              Jan 14, 2025 23:34:17.753509045 CET49806445192.168.2.5115.64.228.169
                                              Jan 14, 2025 23:34:17.753570080 CET49806445192.168.2.5115.64.228.169
                                              Jan 14, 2025 23:34:17.753750086 CET49807445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:17.758588076 CET44549806115.64.228.169192.168.2.5
                                              Jan 14, 2025 23:34:17.758621931 CET44549807115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:17.758651972 CET49806445192.168.2.5115.64.228.169
                                              Jan 14, 2025 23:34:17.758687019 CET49807445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:17.758743048 CET49807445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:17.759475946 CET49808445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:17.763736963 CET44549807115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:17.764060974 CET49807445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:17.764347076 CET44549808115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:17.764420986 CET49808445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:17.764460087 CET49808445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:17.769335032 CET44549808115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:19.763997078 CET49831445192.168.2.574.178.121.222
                                              Jan 14, 2025 23:34:19.769540071 CET4454983174.178.121.222192.168.2.5
                                              Jan 14, 2025 23:34:19.769673109 CET49831445192.168.2.574.178.121.222
                                              Jan 14, 2025 23:34:19.769818068 CET49831445192.168.2.574.178.121.222
                                              Jan 14, 2025 23:34:19.769944906 CET49832445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:19.775141001 CET4454983274.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:19.775185108 CET4454983174.178.121.222192.168.2.5
                                              Jan 14, 2025 23:34:19.775234938 CET49832445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:19.775266886 CET49831445192.168.2.574.178.121.222
                                              Jan 14, 2025 23:34:19.775281906 CET49832445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:19.776036024 CET49833445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:19.780436039 CET4454983274.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:19.780508041 CET49832445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:19.780961990 CET4454983374.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:19.781048059 CET49833445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:19.781120062 CET49833445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:19.785933018 CET4454983374.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:21.780003071 CET49857445192.168.2.5167.175.169.112
                                              Jan 14, 2025 23:34:21.784936905 CET44549857167.175.169.112192.168.2.5
                                              Jan 14, 2025 23:34:21.785017967 CET49857445192.168.2.5167.175.169.112
                                              Jan 14, 2025 23:34:21.785168886 CET49857445192.168.2.5167.175.169.112
                                              Jan 14, 2025 23:34:21.785295963 CET49858445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:21.789998055 CET44549857167.175.169.112192.168.2.5
                                              Jan 14, 2025 23:34:21.790067911 CET49857445192.168.2.5167.175.169.112
                                              Jan 14, 2025 23:34:21.790297985 CET44549858167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:21.790384054 CET49858445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:21.790384054 CET49858445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:21.790900946 CET49859445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:21.795371056 CET44549858167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:21.795443058 CET49858445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:21.795768976 CET44549859167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:21.795852900 CET49859445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:21.795896053 CET49859445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:21.800704956 CET44549859167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:23.795387983 CET49891445192.168.2.5133.205.133.214
                                              Jan 14, 2025 23:34:23.800276041 CET44549891133.205.133.214192.168.2.5
                                              Jan 14, 2025 23:34:23.800360918 CET49891445192.168.2.5133.205.133.214
                                              Jan 14, 2025 23:34:23.800405979 CET49891445192.168.2.5133.205.133.214
                                              Jan 14, 2025 23:34:23.800524950 CET49892445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:23.805349112 CET44549892133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:23.805401087 CET44549891133.205.133.214192.168.2.5
                                              Jan 14, 2025 23:34:23.805449963 CET49892445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:23.805471897 CET49891445192.168.2.5133.205.133.214
                                              Jan 14, 2025 23:34:23.805529118 CET49892445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:23.805762053 CET49893445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:23.810493946 CET44549892133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:23.810570955 CET49892445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:23.810632944 CET44549893133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:23.810695887 CET49893445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:23.810724020 CET49893445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:23.815536022 CET44549893133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:25.812119007 CET49927445192.168.2.5148.13.134.185
                                              Jan 14, 2025 23:34:25.817002058 CET44549927148.13.134.185192.168.2.5
                                              Jan 14, 2025 23:34:25.817269087 CET49927445192.168.2.5148.13.134.185
                                              Jan 14, 2025 23:34:25.817358017 CET49927445192.168.2.5148.13.134.185
                                              Jan 14, 2025 23:34:25.817466974 CET49928445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:25.822276115 CET44549928148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:25.822344065 CET49928445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:25.822371960 CET44549927148.13.134.185192.168.2.5
                                              Jan 14, 2025 23:34:25.822431087 CET49927445192.168.2.5148.13.134.185
                                              Jan 14, 2025 23:34:25.822482109 CET49928445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:25.823576927 CET49929445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:25.827337980 CET44549928148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:25.827395916 CET49928445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:25.828455925 CET44549929148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:25.828536034 CET49929445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:25.828787088 CET49929445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:25.833589077 CET44549929148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:27.825957060 CET49963445192.168.2.5161.190.209.78
                                              Jan 14, 2025 23:34:27.830730915 CET44549963161.190.209.78192.168.2.5
                                              Jan 14, 2025 23:34:27.831332922 CET49963445192.168.2.5161.190.209.78
                                              Jan 14, 2025 23:34:27.831362009 CET49963445192.168.2.5161.190.209.78
                                              Jan 14, 2025 23:34:27.831568003 CET49964445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:27.836256027 CET44549963161.190.209.78192.168.2.5
                                              Jan 14, 2025 23:34:27.836394072 CET44549964161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:27.836550951 CET49963445192.168.2.5161.190.209.78
                                              Jan 14, 2025 23:34:27.836584091 CET49964445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:27.836669922 CET49964445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:27.836961031 CET49965445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:27.841516972 CET44549964161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:27.841734886 CET44549965161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:27.841805935 CET49964445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:27.841828108 CET49965445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:27.841862917 CET49965445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:27.846628904 CET44549965161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:29.841322899 CET49997445192.168.2.5202.122.32.233
                                              Jan 14, 2025 23:34:29.846501112 CET44549997202.122.32.233192.168.2.5
                                              Jan 14, 2025 23:34:29.846575975 CET49997445192.168.2.5202.122.32.233
                                              Jan 14, 2025 23:34:29.846590042 CET49997445192.168.2.5202.122.32.233
                                              Jan 14, 2025 23:34:29.846720934 CET49998445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:29.851737022 CET44549998202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:29.851747990 CET44549997202.122.32.233192.168.2.5
                                              Jan 14, 2025 23:34:29.851808071 CET49997445192.168.2.5202.122.32.233
                                              Jan 14, 2025 23:34:29.852020025 CET49998445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:29.852051020 CET49999445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:29.856885910 CET44549999202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:29.856956005 CET49999445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:29.856998920 CET49999445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:29.857078075 CET44549998202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:29.857132912 CET49998445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:29.861794949 CET44549999202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:31.423824072 CET4454971122.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:31.423906088 CET4454971122.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:31.423903942 CET49711445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:31.423964024 CET49711445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:31.424086094 CET49711445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:31.424086094 CET49711445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:31.433036089 CET4454971122.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:31.433084965 CET4454971122.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:31.857150078 CET50030445192.168.2.560.43.125.135
                                              Jan 14, 2025 23:34:31.862562895 CET4455003060.43.125.135192.168.2.5
                                              Jan 14, 2025 23:34:31.862777948 CET50030445192.168.2.560.43.125.135
                                              Jan 14, 2025 23:34:31.862777948 CET50030445192.168.2.560.43.125.135
                                              Jan 14, 2025 23:34:31.862899065 CET50032445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:31.868035078 CET4455003060.43.125.135192.168.2.5
                                              Jan 14, 2025 23:34:31.868067980 CET4455003260.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:31.868177891 CET50032445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:31.868230104 CET50030445192.168.2.560.43.125.135
                                              Jan 14, 2025 23:34:31.868258953 CET50032445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:31.868496895 CET50033445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:31.873357058 CET4455003260.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:31.873414040 CET4455003360.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:31.873565912 CET50032445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:31.873621941 CET50033445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:31.873621941 CET50033445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:31.878513098 CET4455003360.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:33.094825029 CET4454973769.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:33.094917059 CET49737445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:33.095007896 CET49737445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:33.095009089 CET49737445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:33.099817038 CET4454973769.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:33.100018024 CET4454973769.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:33.872967005 CET50065445192.168.2.5198.241.75.224
                                              Jan 14, 2025 23:34:34.082715034 CET44550065198.241.75.224192.168.2.5
                                              Jan 14, 2025 23:34:34.082897902 CET50065445192.168.2.5198.241.75.224
                                              Jan 14, 2025 23:34:34.082993984 CET50065445192.168.2.5198.241.75.224
                                              Jan 14, 2025 23:34:34.083005905 CET50069445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:34.087850094 CET44550069198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:34.087955952 CET50069445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:34.087955952 CET50069445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:34.088162899 CET44550065198.241.75.224192.168.2.5
                                              Jan 14, 2025 23:34:34.088217974 CET50065445192.168.2.5198.241.75.224
                                              Jan 14, 2025 23:34:34.088324070 CET50070445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:34.092993975 CET44550069198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:34.093056917 CET50069445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:34.093081951 CET44550070198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:34.093147993 CET50070445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:34.093161106 CET50070445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:34.097943068 CET44550070198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:34.435226917 CET50079445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:34.440187931 CET4455007922.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:34.440314054 CET50079445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:34.440377951 CET50079445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:34.445142984 CET4455007922.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:35.888559103 CET50084445192.168.2.5164.159.211.90
                                              Jan 14, 2025 23:34:36.107114077 CET50085445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:36.204130888 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.204253912 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:36.204324961 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:36.204325914 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.204385042 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:36.204385042 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:36.204535961 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.204615116 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:36.204989910 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.205039978 CET49761445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:36.206163883 CET44550084164.159.211.90192.168.2.5
                                              Jan 14, 2025 23:34:36.206175089 CET4455008569.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:36.206237078 CET50084445192.168.2.5164.159.211.90
                                              Jan 14, 2025 23:34:36.206271887 CET50085445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:36.206309080 CET50084445192.168.2.5164.159.211.90
                                              Jan 14, 2025 23:34:36.206379890 CET50085445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:36.206512928 CET50086445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:36.209233999 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.209247112 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.209254980 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.209357977 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.209831953 CET4454976158.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:36.213992119 CET4455008569.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:36.214001894 CET44550086164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:34:36.214052916 CET44550084164.159.211.90192.168.2.5
                                              Jan 14, 2025 23:34:36.214075089 CET50086445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:36.214103937 CET50084445192.168.2.5164.159.211.90
                                              Jan 14, 2025 23:34:36.214179993 CET50086445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:36.214473009 CET50088445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:36.219300032 CET44550088164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:34:36.219383955 CET50088445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:36.219419956 CET44550086164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:34:36.219469070 CET50088445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:36.219484091 CET50086445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:36.226038933 CET44550088164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:34:36.614630938 CET5309153192.168.2.5162.159.36.2
                                              Jan 14, 2025 23:34:36.619507074 CET5353091162.159.36.2192.168.2.5
                                              Jan 14, 2025 23:34:36.619592905 CET5309153192.168.2.5162.159.36.2
                                              Jan 14, 2025 23:34:36.624398947 CET5353091162.159.36.2192.168.2.5
                                              Jan 14, 2025 23:34:37.067817926 CET5309153192.168.2.5162.159.36.2
                                              Jan 14, 2025 23:34:37.072926998 CET5353091162.159.36.2192.168.2.5
                                              Jan 14, 2025 23:34:37.072999954 CET5309153192.168.2.5162.159.36.2
                                              Jan 14, 2025 23:34:37.125796080 CET44549784163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:37.125957966 CET49784445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:37.125958920 CET49784445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:37.126147032 CET49784445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:37.130788088 CET44549784163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:37.130930901 CET44549784163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:37.904041052 CET53100445192.168.2.583.169.224.247
                                              Jan 14, 2025 23:34:37.908823013 CET4455310083.169.224.247192.168.2.5
                                              Jan 14, 2025 23:34:37.908938885 CET53100445192.168.2.583.169.224.247
                                              Jan 14, 2025 23:34:37.908965111 CET53100445192.168.2.583.169.224.247
                                              Jan 14, 2025 23:34:37.909087896 CET53101445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:37.913886070 CET4455310083.169.224.247192.168.2.5
                                              Jan 14, 2025 23:34:37.913897991 CET4455310183.169.224.1192.168.2.5
                                              Jan 14, 2025 23:34:37.913937092 CET53100445192.168.2.583.169.224.247
                                              Jan 14, 2025 23:34:37.913963079 CET53101445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:37.914037943 CET53101445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:37.914297104 CET53102445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:37.918901920 CET4455310183.169.224.1192.168.2.5
                                              Jan 14, 2025 23:34:37.918962002 CET53101445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:37.919068098 CET4455310283.169.224.1192.168.2.5
                                              Jan 14, 2025 23:34:37.919126987 CET53102445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:37.919163942 CET53102445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:37.923916101 CET4455310283.169.224.1192.168.2.5
                                              Jan 14, 2025 23:34:39.141937971 CET44549808115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:39.142138004 CET49808445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:39.142138958 CET49808445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:39.142235041 CET49808445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:39.147726059 CET44549808115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:39.147736073 CET44549808115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:39.216759920 CET53112445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:39.221659899 CET4455311258.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:39.223411083 CET53112445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:39.223474026 CET53112445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:34:39.228250980 CET4455311258.192.79.1192.168.2.5
                                              Jan 14, 2025 23:34:39.920150995 CET53118445192.168.2.5197.111.193.53
                                              Jan 14, 2025 23:34:39.925045013 CET44553118197.111.193.53192.168.2.5
                                              Jan 14, 2025 23:34:39.926873922 CET53118445192.168.2.5197.111.193.53
                                              Jan 14, 2025 23:34:39.957207918 CET53118445192.168.2.5197.111.193.53
                                              Jan 14, 2025 23:34:39.962059021 CET44553118197.111.193.53192.168.2.5
                                              Jan 14, 2025 23:34:39.962151051 CET53118445192.168.2.5197.111.193.53
                                              Jan 14, 2025 23:34:39.971812963 CET53119445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:34:39.976654053 CET44553119197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:34:39.976855040 CET53119445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:34:39.997998953 CET53119445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:34:39.999293089 CET53120445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:34:40.002975941 CET44553119197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:34:40.003062010 CET53119445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:34:40.004570961 CET44553120197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:34:40.004637957 CET53120445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:34:40.004693031 CET53120445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:34:40.009464025 CET44553120197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:34:40.138305902 CET53121445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:40.143934965 CET44553121163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:40.143997908 CET53121445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:40.144052029 CET53121445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:34:40.149827003 CET44553121163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:34:41.152889013 CET4454983374.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:41.156867027 CET49833445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:41.156939983 CET49833445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:41.156974077 CET49833445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:41.161809921 CET4454983374.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:41.161818981 CET4454983374.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:41.935367107 CET53136445192.168.2.5153.5.218.251
                                              Jan 14, 2025 23:34:41.940139055 CET44553136153.5.218.251192.168.2.5
                                              Jan 14, 2025 23:34:41.940221071 CET53136445192.168.2.5153.5.218.251
                                              Jan 14, 2025 23:34:41.940229893 CET53136445192.168.2.5153.5.218.251
                                              Jan 14, 2025 23:34:41.940326929 CET53137445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:34:41.945116043 CET44553137153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:34:41.945200920 CET53137445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:34:41.945200920 CET53137445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:34:41.945322037 CET44553136153.5.218.251192.168.2.5
                                              Jan 14, 2025 23:34:41.945394993 CET53136445192.168.2.5153.5.218.251
                                              Jan 14, 2025 23:34:41.945611000 CET53138445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:34:41.950278997 CET44553137153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:34:41.950339079 CET53137445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:34:41.950385094 CET44553138153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:34:41.950458050 CET53138445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:34:41.950582027 CET53138445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:34:41.955298901 CET44553138153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:34:42.154185057 CET53141445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:42.159054041 CET44553141115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:42.159157038 CET53141445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:42.159221888 CET53141445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:34:42.163980007 CET44553141115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:34:43.137968063 CET44549859167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:43.138081074 CET49859445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:43.138168097 CET49859445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:43.138168097 CET49859445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:43.143022060 CET44549859167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:43.143034935 CET44549859167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:44.169852972 CET53152445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:44.231309891 CET4455315274.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:44.231431961 CET53152445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:44.231523037 CET53152445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:34:44.236295938 CET4455315274.178.121.1192.168.2.5
                                              Jan 14, 2025 23:34:45.076067924 CET53157445192.168.2.5194.204.94.189
                                              Jan 14, 2025 23:34:45.080943108 CET44553157194.204.94.189192.168.2.5
                                              Jan 14, 2025 23:34:45.081034899 CET53157445192.168.2.5194.204.94.189
                                              Jan 14, 2025 23:34:45.081058025 CET53157445192.168.2.5194.204.94.189
                                              Jan 14, 2025 23:34:45.081171989 CET53158445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:34:45.086029053 CET44553158194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:34:45.086042881 CET44553157194.204.94.189192.168.2.5
                                              Jan 14, 2025 23:34:45.086117983 CET53157445192.168.2.5194.204.94.189
                                              Jan 14, 2025 23:34:45.086129904 CET53158445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:34:45.086235046 CET53158445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:34:45.086646080 CET53159445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:34:45.091072083 CET44553158194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:34:45.091149092 CET53158445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:34:45.091504097 CET44553159194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:34:45.091573954 CET53159445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:34:45.091614008 CET53159445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:34:45.096405983 CET44553159194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:34:45.185400009 CET44549893133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:45.185477018 CET49893445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:45.185509920 CET49893445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:45.185560942 CET49893445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:45.190288067 CET44549893133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:45.190300941 CET44549893133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:45.826209068 CET53162445192.168.2.569.170.172.251
                                              Jan 14, 2025 23:34:45.832001925 CET4455316269.170.172.251192.168.2.5
                                              Jan 14, 2025 23:34:45.832205057 CET53162445192.168.2.569.170.172.251
                                              Jan 14, 2025 23:34:45.832206011 CET53162445192.168.2.569.170.172.251
                                              Jan 14, 2025 23:34:45.832425117 CET53163445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:34:45.837517977 CET4455316369.170.172.1192.168.2.5
                                              Jan 14, 2025 23:34:45.837551117 CET4455316269.170.172.251192.168.2.5
                                              Jan 14, 2025 23:34:45.837620020 CET53163445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:34:45.837790012 CET53162445192.168.2.569.170.172.251
                                              Jan 14, 2025 23:34:45.837791920 CET53163445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:34:45.837908983 CET53164445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:34:45.842591047 CET4455316369.170.172.1192.168.2.5
                                              Jan 14, 2025 23:34:45.842655897 CET53163445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:34:45.842674971 CET4455316469.170.172.1192.168.2.5
                                              Jan 14, 2025 23:34:45.842735052 CET53164445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:34:45.842763901 CET53164445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:34:45.848315954 CET4455316469.170.172.1192.168.2.5
                                              Jan 14, 2025 23:34:46.154131889 CET53167445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:46.159181118 CET44553167167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:46.159632921 CET53167445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:46.159632921 CET53167445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:34:46.164530993 CET44553167167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:34:47.200262070 CET44549929148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:47.204880953 CET49929445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:47.204919100 CET49929445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:47.204965115 CET49929445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:47.209839106 CET44549929148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:47.209868908 CET44549929148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:47.576082945 CET53178445192.168.2.5215.212.124.8
                                              Jan 14, 2025 23:34:47.581290960 CET44553178215.212.124.8192.168.2.5
                                              Jan 14, 2025 23:34:47.583409071 CET53178445192.168.2.5215.212.124.8
                                              Jan 14, 2025 23:34:47.583595991 CET53178445192.168.2.5215.212.124.8
                                              Jan 14, 2025 23:34:47.583867073 CET53179445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:34:47.588759899 CET44553179215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:34:47.588956118 CET53179445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:34:47.588959932 CET44553178215.212.124.8192.168.2.5
                                              Jan 14, 2025 23:34:47.589010954 CET53179445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:34:47.589023113 CET53178445192.168.2.5215.212.124.8
                                              Jan 14, 2025 23:34:47.589277029 CET53180445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:34:47.593962908 CET44553179215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:34:47.594121933 CET44553180215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:34:47.594151020 CET53179445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:34:47.594245911 CET53180445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:34:47.594265938 CET53180445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:34:47.599077940 CET44553180215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:34:48.200725079 CET53185445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:48.205611944 CET44553185133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:48.205708981 CET53185445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:48.205743074 CET53185445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:34:48.210592031 CET44553185133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:34:49.185127974 CET44549965161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:49.185213089 CET49965445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:49.185251951 CET49965445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:49.185278893 CET49965445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:49.190227985 CET44549965161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:49.190258026 CET44549965161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:49.216730118 CET53192445192.168.2.5149.224.92.109
                                              Jan 14, 2025 23:34:49.221647978 CET44553192149.224.92.109192.168.2.5
                                              Jan 14, 2025 23:34:49.221765041 CET53192445192.168.2.5149.224.92.109
                                              Jan 14, 2025 23:34:49.221823931 CET53192445192.168.2.5149.224.92.109
                                              Jan 14, 2025 23:34:49.221966028 CET53193445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:34:49.226855993 CET44553193149.224.92.1192.168.2.5
                                              Jan 14, 2025 23:34:49.226883888 CET44553192149.224.92.109192.168.2.5
                                              Jan 14, 2025 23:34:49.226932049 CET53193445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:34:49.226938009 CET53192445192.168.2.5149.224.92.109
                                              Jan 14, 2025 23:34:49.227001905 CET53193445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:34:49.227327108 CET53194445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:34:49.232002020 CET44553193149.224.92.1192.168.2.5
                                              Jan 14, 2025 23:34:49.232081890 CET53193445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:34:49.232146978 CET44553194149.224.92.1192.168.2.5
                                              Jan 14, 2025 23:34:49.232220888 CET53194445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:34:49.232285976 CET53194445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:34:49.237201929 CET44553194149.224.92.1192.168.2.5
                                              Jan 14, 2025 23:34:50.216331005 CET53202445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:50.221518040 CET44553202148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:50.222311974 CET53202445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:50.222342014 CET53202445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:34:50.227235079 CET44553202148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:34:50.748954058 CET53206445192.168.2.5140.174.26.201
                                              Jan 14, 2025 23:34:50.753923893 CET44553206140.174.26.201192.168.2.5
                                              Jan 14, 2025 23:34:50.754101038 CET53206445192.168.2.5140.174.26.201
                                              Jan 14, 2025 23:34:50.754118919 CET53206445192.168.2.5140.174.26.201
                                              Jan 14, 2025 23:34:50.754240036 CET53207445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:34:50.759051085 CET44553207140.174.26.1192.168.2.5
                                              Jan 14, 2025 23:34:50.759121895 CET53207445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:34:50.759139061 CET53207445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:34:50.759495020 CET53208445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:34:50.761774063 CET44553206140.174.26.201192.168.2.5
                                              Jan 14, 2025 23:34:50.764358044 CET44553208140.174.26.1192.168.2.5
                                              Jan 14, 2025 23:34:50.764457941 CET53208445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:34:50.764496088 CET53208445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:34:50.765558004 CET44553206140.174.26.201192.168.2.5
                                              Jan 14, 2025 23:34:50.765619040 CET53206445192.168.2.5140.174.26.201
                                              Jan 14, 2025 23:34:50.765681982 CET44553207140.174.26.1192.168.2.5
                                              Jan 14, 2025 23:34:50.765738010 CET53207445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:34:50.769263983 CET44553208140.174.26.1192.168.2.5
                                              Jan 14, 2025 23:34:51.231898069 CET44549999202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:51.232304096 CET49999445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:51.232305050 CET49999445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:51.232400894 CET49999445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:51.237351894 CET44549999202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:51.237508059 CET44549999202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:52.169882059 CET53218445192.168.2.5145.214.61.104
                                              Jan 14, 2025 23:34:52.174770117 CET44553218145.214.61.104192.168.2.5
                                              Jan 14, 2025 23:34:52.174901962 CET53218445192.168.2.5145.214.61.104
                                              Jan 14, 2025 23:34:52.175039053 CET53218445192.168.2.5145.214.61.104
                                              Jan 14, 2025 23:34:52.175332069 CET53219445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:34:52.180191994 CET44553219145.214.61.1192.168.2.5
                                              Jan 14, 2025 23:34:52.180274010 CET53219445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:34:52.180422068 CET53219445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:34:52.180599928 CET53220445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:34:52.181792021 CET44553218145.214.61.104192.168.2.5
                                              Jan 14, 2025 23:34:52.185436010 CET44553220145.214.61.1192.168.2.5
                                              Jan 14, 2025 23:34:52.185499907 CET53220445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:34:52.185518026 CET53220445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:34:52.185842037 CET44553219145.214.61.1192.168.2.5
                                              Jan 14, 2025 23:34:52.190334082 CET44553220145.214.61.1192.168.2.5
                                              Jan 14, 2025 23:34:52.192605972 CET44553218145.214.61.104192.168.2.5
                                              Jan 14, 2025 23:34:52.192683935 CET53218445192.168.2.5145.214.61.104
                                              Jan 14, 2025 23:34:52.197174072 CET44553219145.214.61.1192.168.2.5
                                              Jan 14, 2025 23:34:52.197280884 CET53219445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:34:52.200720072 CET53222445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:52.205528021 CET44553222161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:52.205596924 CET53222445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:52.205629110 CET53222445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:34:52.210477114 CET44553222161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:34:53.264951944 CET4455003360.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:53.265218973 CET50033445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:53.265219927 CET50033445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:53.265219927 CET50033445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:53.270225048 CET4455003360.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:53.270255089 CET4455003360.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:53.497905970 CET53231445192.168.2.5164.90.167.99
                                              Jan 14, 2025 23:34:53.503038883 CET44553231164.90.167.99192.168.2.5
                                              Jan 14, 2025 23:34:53.503184080 CET53231445192.168.2.5164.90.167.99
                                              Jan 14, 2025 23:34:53.503211975 CET53231445192.168.2.5164.90.167.99
                                              Jan 14, 2025 23:34:53.503371000 CET53232445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:34:53.508255005 CET44553232164.90.167.1192.168.2.5
                                              Jan 14, 2025 23:34:53.508352995 CET44553231164.90.167.99192.168.2.5
                                              Jan 14, 2025 23:34:53.508369923 CET53232445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:34:53.508369923 CET53232445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:34:53.508583069 CET53233445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:34:53.508600950 CET53231445192.168.2.5164.90.167.99
                                              Jan 14, 2025 23:34:53.513479948 CET44553232164.90.167.1192.168.2.5
                                              Jan 14, 2025 23:34:53.513509989 CET44553233164.90.167.1192.168.2.5
                                              Jan 14, 2025 23:34:53.513534069 CET53232445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:34:53.513569117 CET53233445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:34:53.513592005 CET53233445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:34:53.518518925 CET44553233164.90.167.1192.168.2.5
                                              Jan 14, 2025 23:34:54.247603893 CET53238445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:54.252540112 CET44553238202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:54.253911018 CET53238445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:54.254018068 CET53238445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:34:54.258831024 CET44553238202.122.32.1192.168.2.5
                                              Jan 14, 2025 23:34:54.732665062 CET53242445192.168.2.561.204.190.117
                                              Jan 14, 2025 23:34:54.737654924 CET4455324261.204.190.117192.168.2.5
                                              Jan 14, 2025 23:34:54.737806082 CET53242445192.168.2.561.204.190.117
                                              Jan 14, 2025 23:34:54.737930059 CET53242445192.168.2.561.204.190.117
                                              Jan 14, 2025 23:34:54.738312006 CET53243445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:34:54.742877960 CET4455324261.204.190.117192.168.2.5
                                              Jan 14, 2025 23:34:54.742964029 CET53242445192.168.2.561.204.190.117
                                              Jan 14, 2025 23:34:54.743160009 CET4455324361.204.190.1192.168.2.5
                                              Jan 14, 2025 23:34:54.743242025 CET53243445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:34:54.743257046 CET53243445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:34:54.743602991 CET53244445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:34:54.748395920 CET4455324461.204.190.1192.168.2.5
                                              Jan 14, 2025 23:34:54.749078989 CET53244445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:34:54.749089956 CET53244445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:34:54.749766111 CET4455324361.204.190.1192.168.2.5
                                              Jan 14, 2025 23:34:54.753916025 CET4455324461.204.190.1192.168.2.5
                                              Jan 14, 2025 23:34:54.768645048 CET4455324361.204.190.1192.168.2.5
                                              Jan 14, 2025 23:34:54.768702984 CET53243445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:34:55.486661911 CET44550070198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:55.487381935 CET50070445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:55.487416029 CET50070445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:55.487464905 CET50070445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:55.492324114 CET44550070198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:55.492353916 CET44550070198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:55.813924074 CET4455007922.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:55.813993931 CET50079445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:55.814069986 CET50079445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:55.814166069 CET50079445192.168.2.522.33.251.1
                                              Jan 14, 2025 23:34:55.818872929 CET4455007922.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:55.818972111 CET4455007922.33.251.1192.168.2.5
                                              Jan 14, 2025 23:34:55.872893095 CET53253445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:34:55.877774000 CET4455325322.33.251.2192.168.2.5
                                              Jan 14, 2025 23:34:55.877851009 CET53253445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:34:55.877942085 CET53253445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:34:55.878307104 CET53254445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:34:55.882847071 CET4455325322.33.251.2192.168.2.5
                                              Jan 14, 2025 23:34:55.882910967 CET53253445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:34:55.883106947 CET4455325422.33.251.2192.168.2.5
                                              Jan 14, 2025 23:34:55.883186102 CET53254445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:34:55.883228064 CET53254445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:34:55.888003111 CET4455325422.33.251.2192.168.2.5
                                              Jan 14, 2025 23:34:55.888425112 CET53255445192.168.2.580.104.46.124
                                              Jan 14, 2025 23:34:55.893338919 CET4455325580.104.46.124192.168.2.5
                                              Jan 14, 2025 23:34:55.893407106 CET53255445192.168.2.580.104.46.124
                                              Jan 14, 2025 23:34:55.893465996 CET53255445192.168.2.580.104.46.124
                                              Jan 14, 2025 23:34:55.893724918 CET53256445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:34:55.898497105 CET4455325580.104.46.124192.168.2.5
                                              Jan 14, 2025 23:34:55.898550987 CET53255445192.168.2.580.104.46.124
                                              Jan 14, 2025 23:34:55.898617983 CET4455325680.104.46.1192.168.2.5
                                              Jan 14, 2025 23:34:55.898690939 CET53256445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:34:55.898744106 CET53256445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:34:55.899081945 CET53257445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:34:55.903662920 CET4455325680.104.46.1192.168.2.5
                                              Jan 14, 2025 23:34:55.903728962 CET53256445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:34:55.904033899 CET4455325780.104.46.1192.168.2.5
                                              Jan 14, 2025 23:34:55.904149055 CET53257445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:34:55.904194117 CET53257445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:34:55.909033060 CET4455325780.104.46.1192.168.2.5
                                              Jan 14, 2025 23:34:56.278913021 CET53258445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:56.283835888 CET4455325860.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:56.283920050 CET53258445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:56.283936024 CET53258445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:34:56.288813114 CET4455325860.43.125.1192.168.2.5
                                              Jan 14, 2025 23:34:56.966833115 CET53264445192.168.2.5119.11.25.6
                                              Jan 14, 2025 23:34:56.971677065 CET44553264119.11.25.6192.168.2.5
                                              Jan 14, 2025 23:34:56.971770048 CET53264445192.168.2.5119.11.25.6
                                              Jan 14, 2025 23:34:56.971810102 CET53264445192.168.2.5119.11.25.6
                                              Jan 14, 2025 23:34:56.971941948 CET53265445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:34:56.976794958 CET44553265119.11.25.1192.168.2.5
                                              Jan 14, 2025 23:34:56.976809025 CET44553264119.11.25.6192.168.2.5
                                              Jan 14, 2025 23:34:56.976878881 CET53264445192.168.2.5119.11.25.6
                                              Jan 14, 2025 23:34:56.976900101 CET53265445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:34:56.976901054 CET53265445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:34:56.977199078 CET53266445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:34:56.981822014 CET44553265119.11.25.1192.168.2.5
                                              Jan 14, 2025 23:34:56.982088089 CET44553266119.11.25.1192.168.2.5
                                              Jan 14, 2025 23:34:56.982151985 CET53265445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:34:56.982180119 CET53266445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:34:56.982223034 CET53266445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:34:56.986994982 CET44553266119.11.25.1192.168.2.5
                                              Jan 14, 2025 23:34:57.591250896 CET4455008569.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:57.591267109 CET44550088164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:34:57.591348886 CET50085445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:57.591434956 CET50085445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:57.591444016 CET50088445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:57.591491938 CET50085445192.168.2.569.124.198.1
                                              Jan 14, 2025 23:34:57.592227936 CET50088445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:57.592228889 CET50088445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:34:57.596344948 CET4455008569.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:57.596385956 CET4455008569.124.198.1192.168.2.5
                                              Jan 14, 2025 23:34:57.597075939 CET44550088164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:34:57.597089052 CET44550088164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:34:57.654100895 CET53272445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:34:57.658924103 CET4455327269.124.198.2192.168.2.5
                                              Jan 14, 2025 23:34:57.659101009 CET53272445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:34:57.659131050 CET53272445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:34:57.659425974 CET53273445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:34:57.664102077 CET4455327269.124.198.2192.168.2.5
                                              Jan 14, 2025 23:34:57.664159060 CET53272445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:34:57.664251089 CET4455327369.124.198.2192.168.2.5
                                              Jan 14, 2025 23:34:57.664308071 CET53273445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:34:57.664333105 CET53273445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:34:57.669861078 CET4455327369.124.198.2192.168.2.5
                                              Jan 14, 2025 23:34:57.982377052 CET53276445192.168.2.5160.234.246.195
                                              Jan 14, 2025 23:34:58.094400883 CET44553276160.234.246.195192.168.2.5
                                              Jan 14, 2025 23:34:58.094475031 CET53276445192.168.2.5160.234.246.195
                                              Jan 14, 2025 23:34:58.094552994 CET53276445192.168.2.5160.234.246.195
                                              Jan 14, 2025 23:34:58.094690084 CET53277445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:34:58.099678993 CET44553277160.234.246.1192.168.2.5
                                              Jan 14, 2025 23:34:58.099740028 CET53277445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:34:58.099785089 CET53277445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:34:58.099791050 CET44553276160.234.246.195192.168.2.5
                                              Jan 14, 2025 23:34:58.099842072 CET53276445192.168.2.5160.234.246.195
                                              Jan 14, 2025 23:34:58.100042105 CET53281445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:34:58.104834080 CET44553277160.234.246.1192.168.2.5
                                              Jan 14, 2025 23:34:58.104846954 CET44553281160.234.246.1192.168.2.5
                                              Jan 14, 2025 23:34:58.104897022 CET53277445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:34:58.104904890 CET53281445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:34:58.104927063 CET53281445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:34:58.109836102 CET44553281160.234.246.1192.168.2.5
                                              Jan 14, 2025 23:34:58.497822046 CET53282445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:58.503098965 CET44553282198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:58.503184080 CET53282445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:58.503200054 CET53282445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:34:58.507965088 CET44553282198.241.75.1192.168.2.5
                                              Jan 14, 2025 23:34:58.920039892 CET53288445192.168.2.5124.94.33.112
                                              Jan 14, 2025 23:34:58.925378084 CET44553288124.94.33.112192.168.2.5
                                              Jan 14, 2025 23:34:58.925473928 CET53288445192.168.2.5124.94.33.112
                                              Jan 14, 2025 23:34:58.925602913 CET53288445192.168.2.5124.94.33.112
                                              Jan 14, 2025 23:34:58.925602913 CET53289445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:34:58.930397034 CET44553289124.94.33.1192.168.2.5
                                              Jan 14, 2025 23:34:58.930444002 CET44553288124.94.33.112192.168.2.5
                                              Jan 14, 2025 23:34:58.930494070 CET53289445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:34:58.930526018 CET53289445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:34:58.930529118 CET53288445192.168.2.5124.94.33.112
                                              Jan 14, 2025 23:34:58.930819035 CET53290445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:34:58.935446024 CET44553289124.94.33.1192.168.2.5
                                              Jan 14, 2025 23:34:58.935523033 CET53289445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:34:58.935625076 CET44553290124.94.33.1192.168.2.5
                                              Jan 14, 2025 23:34:58.935676098 CET53290445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:34:58.935707092 CET53290445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:34:58.940507889 CET44553290124.94.33.1192.168.2.5
                                              Jan 14, 2025 23:34:59.296061039 CET4455310283.169.224.1192.168.2.5
                                              Jan 14, 2025 23:34:59.296143055 CET53102445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:59.296189070 CET53102445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:59.296260118 CET53102445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:34:59.300951004 CET4455310283.169.224.1192.168.2.5
                                              Jan 14, 2025 23:34:59.300997972 CET4455310283.169.224.1192.168.2.5
                                              Jan 14, 2025 23:34:59.799040079 CET53296445192.168.2.5190.175.99.91
                                              Jan 14, 2025 23:34:59.803953886 CET44553296190.175.99.91192.168.2.5
                                              Jan 14, 2025 23:34:59.804018974 CET53296445192.168.2.5190.175.99.91
                                              Jan 14, 2025 23:34:59.804095984 CET53296445192.168.2.5190.175.99.91
                                              Jan 14, 2025 23:34:59.804313898 CET53297445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:34:59.809150934 CET44553297190.175.99.1192.168.2.5
                                              Jan 14, 2025 23:34:59.809166908 CET44553296190.175.99.91192.168.2.5
                                              Jan 14, 2025 23:34:59.809211969 CET53297445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:34:59.809233904 CET53296445192.168.2.5190.175.99.91
                                              Jan 14, 2025 23:34:59.809251070 CET53297445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:34:59.809614897 CET53298445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:34:59.814115047 CET44553297190.175.99.1192.168.2.5
                                              Jan 14, 2025 23:34:59.814161062 CET53297445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:34:59.814405918 CET44553298190.175.99.1192.168.2.5
                                              Jan 14, 2025 23:34:59.814471960 CET53298445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:34:59.814506054 CET53298445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:34:59.819288015 CET44553298190.175.99.1192.168.2.5
                                              Jan 14, 2025 23:35:00.577465057 CET4455311258.192.79.1192.168.2.5
                                              Jan 14, 2025 23:35:00.577579975 CET53112445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:35:00.577644110 CET53112445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:35:00.577738047 CET53112445192.168.2.558.192.79.1
                                              Jan 14, 2025 23:35:00.584361076 CET4455311258.192.79.1192.168.2.5
                                              Jan 14, 2025 23:35:00.584525108 CET4455311258.192.79.1192.168.2.5
                                              Jan 14, 2025 23:35:00.607232094 CET53304445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:35:00.614126921 CET44553304164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:35:00.614316940 CET53304445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:35:00.614316940 CET53304445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:35:00.620997906 CET44553304164.159.211.1192.168.2.5
                                              Jan 14, 2025 23:35:00.623153925 CET53305445192.168.2.5108.170.252.106
                                              Jan 14, 2025 23:35:00.628151894 CET44553305108.170.252.106192.168.2.5
                                              Jan 14, 2025 23:35:00.628248930 CET53305445192.168.2.5108.170.252.106
                                              Jan 14, 2025 23:35:00.628338099 CET53305445192.168.2.5108.170.252.106
                                              Jan 14, 2025 23:35:00.628591061 CET53306445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:00.635152102 CET44553305108.170.252.106192.168.2.5
                                              Jan 14, 2025 23:35:00.635232925 CET53305445192.168.2.5108.170.252.106
                                              Jan 14, 2025 23:35:00.635454893 CET44553306108.170.252.1192.168.2.5
                                              Jan 14, 2025 23:35:00.635529041 CET53306445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:00.635623932 CET53306445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:00.636033058 CET53307445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:00.638556004 CET53308445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:00.642376900 CET44553306108.170.252.1192.168.2.5
                                              Jan 14, 2025 23:35:00.642456055 CET53306445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:00.642658949 CET44553307108.170.252.1192.168.2.5
                                              Jan 14, 2025 23:35:00.642719030 CET53307445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:00.642751932 CET53307445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:00.645267963 CET4455330858.192.79.2192.168.2.5
                                              Jan 14, 2025 23:35:00.645333052 CET53308445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:00.645404100 CET53308445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:00.645663023 CET53309445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:00.649458885 CET44553307108.170.252.1192.168.2.5
                                              Jan 14, 2025 23:35:00.652343988 CET4455330858.192.79.2192.168.2.5
                                              Jan 14, 2025 23:35:00.652431011 CET53308445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:00.652487993 CET4455330958.192.79.2192.168.2.5
                                              Jan 14, 2025 23:35:00.652546883 CET53309445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:00.652584076 CET53309445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:00.659436941 CET4455330958.192.79.2192.168.2.5
                                              Jan 14, 2025 23:35:01.376310110 CET44553120197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:35:01.376386881 CET53120445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:35:01.376480103 CET53120445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:35:01.376532078 CET53120445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:35:01.381289005 CET44553120197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:35:01.381303072 CET44553120197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:35:01.388547897 CET53315445192.168.2.5123.102.22.183
                                              Jan 14, 2025 23:35:01.393506050 CET44553315123.102.22.183192.168.2.5
                                              Jan 14, 2025 23:35:01.393573999 CET53315445192.168.2.5123.102.22.183
                                              Jan 14, 2025 23:35:01.393616915 CET53315445192.168.2.5123.102.22.183
                                              Jan 14, 2025 23:35:01.393800020 CET53316445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:01.398662090 CET44553315123.102.22.183192.168.2.5
                                              Jan 14, 2025 23:35:01.398677111 CET44553316123.102.22.1192.168.2.5
                                              Jan 14, 2025 23:35:01.398718119 CET53315445192.168.2.5123.102.22.183
                                              Jan 14, 2025 23:35:01.398827076 CET53316445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:01.398827076 CET53316445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:01.399010897 CET53317445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:01.403803110 CET44553317123.102.22.1192.168.2.5
                                              Jan 14, 2025 23:35:01.403856039 CET44553316123.102.22.1192.168.2.5
                                              Jan 14, 2025 23:35:01.403908014 CET53317445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:01.403908014 CET53317445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:01.403958082 CET53316445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:01.408723116 CET44553317123.102.22.1192.168.2.5
                                              Jan 14, 2025 23:35:01.532902002 CET44553121163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:35:01.532991886 CET53121445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:35:01.533041000 CET53121445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:35:01.533092022 CET53121445192.168.2.5163.33.155.1
                                              Jan 14, 2025 23:35:01.537945986 CET44553121163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:35:01.537959099 CET44553121163.33.155.1192.168.2.5
                                              Jan 14, 2025 23:35:01.591810942 CET53318445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:01.596719980 CET44553318163.33.155.2192.168.2.5
                                              Jan 14, 2025 23:35:01.596841097 CET53318445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:01.596901894 CET53318445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:01.597292900 CET53319445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:01.601794958 CET44553318163.33.155.2192.168.2.5
                                              Jan 14, 2025 23:35:01.601855040 CET53318445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:01.602072954 CET44553319163.33.155.2192.168.2.5
                                              Jan 14, 2025 23:35:01.602133989 CET53319445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:01.602169037 CET53319445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:01.606930017 CET44553319163.33.155.2192.168.2.5
                                              Jan 14, 2025 23:35:02.314342022 CET53326445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:35:02.320600986 CET4455332683.169.224.1192.168.2.5
                                              Jan 14, 2025 23:35:02.320687056 CET53326445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:35:02.320718050 CET53326445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:35:02.330039978 CET4455332683.169.224.1192.168.2.5
                                              Jan 14, 2025 23:35:03.311871052 CET44553138153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:35:03.314467907 CET53138445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:35:03.314575911 CET53138445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:35:03.314634085 CET53138445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:35:03.319355011 CET44553138153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:35:03.319422007 CET44553138153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:35:03.517193079 CET44553141115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:35:03.517625093 CET53141445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:35:03.517626047 CET53141445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:35:03.517726898 CET53141445192.168.2.5115.64.228.1
                                              Jan 14, 2025 23:35:03.522479057 CET44553141115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:35:03.522593021 CET44553141115.64.228.1192.168.2.5
                                              Jan 14, 2025 23:35:03.576097965 CET53340445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:03.581574917 CET44553340115.64.228.2192.168.2.5
                                              Jan 14, 2025 23:35:03.581794024 CET53340445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:03.581794024 CET53340445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:03.582087040 CET53341445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:03.587157965 CET44553340115.64.228.2192.168.2.5
                                              Jan 14, 2025 23:35:03.587223053 CET44553341115.64.228.2192.168.2.5
                                              Jan 14, 2025 23:35:03.587234020 CET53340445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:03.587286949 CET53341445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:03.587306976 CET53341445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:03.592103004 CET44553341115.64.228.2192.168.2.5
                                              Jan 14, 2025 23:35:04.388372898 CET53350445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:35:04.421235085 CET44553350197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:35:04.422454119 CET53350445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:35:04.422540903 CET53350445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:35:04.427304029 CET44553350197.111.193.1192.168.2.5
                                              Jan 14, 2025 23:35:05.593591928 CET4455315274.178.121.1192.168.2.5
                                              Jan 14, 2025 23:35:05.593686104 CET53152445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:35:05.593782902 CET53152445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:35:05.593816996 CET53152445192.168.2.574.178.121.1
                                              Jan 14, 2025 23:35:05.598571062 CET4455315274.178.121.1192.168.2.5
                                              Jan 14, 2025 23:35:05.598583937 CET4455315274.178.121.1192.168.2.5
                                              Jan 14, 2025 23:35:05.654370070 CET53368445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:05.659172058 CET4455336874.178.121.2192.168.2.5
                                              Jan 14, 2025 23:35:05.659250021 CET53368445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:05.659282923 CET53368445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:05.659569979 CET53370445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:05.664165020 CET4455336874.178.121.2192.168.2.5
                                              Jan 14, 2025 23:35:05.664227962 CET53368445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:05.664331913 CET4455337074.178.121.2192.168.2.5
                                              Jan 14, 2025 23:35:05.664403915 CET53370445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:05.664453030 CET53370445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:05.669220924 CET4455337074.178.121.2192.168.2.5
                                              Jan 14, 2025 23:35:06.326045990 CET53376445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:35:06.330985069 CET44553376153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:35:06.331077099 CET53376445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:35:06.331115961 CET53376445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:35:06.335856915 CET44553376153.5.218.1192.168.2.5
                                              Jan 14, 2025 23:35:06.466217041 CET44553159194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:35:06.466281891 CET53159445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:35:06.466335058 CET53159445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:35:06.466335058 CET53159445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:35:06.471220970 CET44553159194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:35:06.471230984 CET44553159194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:35:07.200680017 CET4455316469.170.172.1192.168.2.5
                                              Jan 14, 2025 23:35:07.200751066 CET53164445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:35:07.219377041 CET53164445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:35:07.219619036 CET53164445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:35:07.224240065 CET4455316469.170.172.1192.168.2.5
                                              Jan 14, 2025 23:35:07.224427938 CET4455316469.170.172.1192.168.2.5
                                              Jan 14, 2025 23:35:07.544593096 CET44553167167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:35:07.544666052 CET53167445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:35:07.544704914 CET53167445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:35:07.544739962 CET53167445192.168.2.5167.175.169.1
                                              Jan 14, 2025 23:35:07.549510956 CET44553167167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:35:07.549520969 CET44553167167.175.169.1192.168.2.5
                                              Jan 14, 2025 23:35:07.624152899 CET53400445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:07.629043102 CET44553400167.175.169.2192.168.2.5
                                              Jan 14, 2025 23:35:07.629117966 CET53400445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:07.629158020 CET53400445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:07.630959034 CET53401445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:07.634016991 CET44553400167.175.169.2192.168.2.5
                                              Jan 14, 2025 23:35:07.634072065 CET53400445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:07.635718107 CET44553401167.175.169.2192.168.2.5
                                              Jan 14, 2025 23:35:07.635778904 CET53401445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:07.635816097 CET53401445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:07.640563965 CET44553401167.175.169.2192.168.2.5
                                              Jan 14, 2025 23:35:08.935844898 CET44553180215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:35:08.939412117 CET53180445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:35:08.945420980 CET53180445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:35:08.945447922 CET53180445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:35:08.950278044 CET44553180215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:35:08.950293064 CET44553180215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:35:09.483071089 CET53431445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:35:09.488501072 CET44553431194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:35:09.488579988 CET53431445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:35:09.488616943 CET53431445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:35:09.495373964 CET44553431194.204.94.1192.168.2.5
                                              Jan 14, 2025 23:35:09.597141027 CET44553185133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:35:09.597238064 CET53185445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:35:09.597347021 CET53185445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:35:09.597347021 CET53185445192.168.2.5133.205.133.1
                                              Jan 14, 2025 23:35:09.602196932 CET44553185133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:35:09.602205992 CET44553185133.205.133.1192.168.2.5
                                              Jan 14, 2025 23:35:09.656502008 CET53436445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:09.661384106 CET44553436133.205.133.2192.168.2.5
                                              Jan 14, 2025 23:35:09.661485910 CET53436445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:09.661736012 CET53436445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:09.662251949 CET53437445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:09.666548014 CET44553436133.205.133.2192.168.2.5
                                              Jan 14, 2025 23:35:09.666649103 CET53436445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:09.667037964 CET44553437133.205.133.2192.168.2.5
                                              Jan 14, 2025 23:35:09.667102098 CET53437445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:09.667139053 CET53437445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:09.671921968 CET44553437133.205.133.2192.168.2.5
                                              Jan 14, 2025 23:35:10.232023954 CET53451445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:35:10.237257004 CET4455345169.170.172.1192.168.2.5
                                              Jan 14, 2025 23:35:10.237340927 CET53451445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:35:10.237361908 CET53451445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:35:10.242244959 CET4455345169.170.172.1192.168.2.5
                                              Jan 14, 2025 23:35:10.591617107 CET44553194149.224.92.1192.168.2.5
                                              Jan 14, 2025 23:35:10.591727018 CET53194445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:35:10.591813087 CET53194445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:35:10.591813087 CET53194445192.168.2.5149.224.92.1
                                              Jan 14, 2025 23:35:10.596833944 CET44553194149.224.92.1192.168.2.5
                                              Jan 14, 2025 23:35:10.596935987 CET44553194149.224.92.1192.168.2.5
                                              Jan 14, 2025 23:35:11.686219931 CET44553202148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:35:11.687074900 CET53202445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:35:11.687119961 CET53202445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:35:11.687119961 CET53202445192.168.2.5148.13.134.1
                                              Jan 14, 2025 23:35:11.691899061 CET44553202148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:35:11.691921949 CET44553202148.13.134.1192.168.2.5
                                              Jan 14, 2025 23:35:11.747747898 CET53497445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:11.752645969 CET44553497148.13.134.2192.168.2.5
                                              Jan 14, 2025 23:35:11.753019094 CET53497445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:11.753086090 CET53497445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:11.753422022 CET53499445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:11.758208036 CET44553499148.13.134.2192.168.2.5
                                              Jan 14, 2025 23:35:11.759030104 CET53499445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:11.759067059 CET53499445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:11.763864994 CET44553499148.13.134.2192.168.2.5
                                              Jan 14, 2025 23:35:11.765342951 CET44553497148.13.134.2192.168.2.5
                                              Jan 14, 2025 23:35:11.768013000 CET53497445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:11.950843096 CET53509445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:35:11.955709934 CET44553509215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:35:11.955777884 CET53509445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:35:11.955790997 CET53509445192.168.2.5215.212.124.1
                                              Jan 14, 2025 23:35:11.960555077 CET44553509215.212.124.1192.168.2.5
                                              Jan 14, 2025 23:35:12.175189972 CET44553208140.174.26.1192.168.2.5
                                              Jan 14, 2025 23:35:12.175338030 CET53208445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:35:12.175374985 CET53208445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:35:12.175388098 CET53208445192.168.2.5140.174.26.1
                                              Jan 14, 2025 23:35:12.181029081 CET44553208140.174.26.1192.168.2.5
                                              Jan 14, 2025 23:35:12.181041956 CET44553208140.174.26.1192.168.2.5
                                              Jan 14, 2025 23:35:13.564122915 CET44553220145.214.61.1192.168.2.5
                                              Jan 14, 2025 23:35:13.564330101 CET53220445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:35:13.612812996 CET44553222161.190.209.1192.168.2.5
                                              Jan 14, 2025 23:35:13.612879038 CET53222445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:35:13.821933985 CET53254445192.168.2.522.33.251.2
                                              Jan 14, 2025 23:35:13.822025061 CET53401445192.168.2.5167.175.169.2
                                              Jan 14, 2025 23:35:13.822072983 CET53319445192.168.2.5163.33.155.2
                                              Jan 14, 2025 23:35:13.822084904 CET53222445192.168.2.5161.190.209.1
                                              Jan 14, 2025 23:35:13.822150946 CET53341445192.168.2.5115.64.228.2
                                              Jan 14, 2025 23:35:13.822225094 CET53304445192.168.2.5164.159.211.1
                                              Jan 14, 2025 23:35:13.822253942 CET53233445192.168.2.5164.90.167.1
                                              Jan 14, 2025 23:35:13.822273016 CET53220445192.168.2.5145.214.61.1
                                              Jan 14, 2025 23:35:13.822273016 CET53238445192.168.2.5202.122.32.1
                                              Jan 14, 2025 23:35:13.822298050 CET53244445192.168.2.561.204.190.1
                                              Jan 14, 2025 23:35:13.822345018 CET53258445192.168.2.560.43.125.1
                                              Jan 14, 2025 23:35:13.822396994 CET53273445192.168.2.569.124.198.2
                                              Jan 14, 2025 23:35:13.822446108 CET53282445192.168.2.5198.241.75.1
                                              Jan 14, 2025 23:35:13.822453022 CET53257445192.168.2.580.104.46.1
                                              Jan 14, 2025 23:35:13.822453022 CET53266445192.168.2.5119.11.25.1
                                              Jan 14, 2025 23:35:13.822463036 CET53290445192.168.2.5124.94.33.1
                                              Jan 14, 2025 23:35:13.822467089 CET53281445192.168.2.5160.234.246.1
                                              Jan 14, 2025 23:35:13.822525978 CET53298445192.168.2.5190.175.99.1
                                              Jan 14, 2025 23:35:13.822525978 CET53309445192.168.2.558.192.79.2
                                              Jan 14, 2025 23:35:13.822540045 CET53317445192.168.2.5123.102.22.1
                                              Jan 14, 2025 23:35:13.822582006 CET53326445192.168.2.583.169.224.1
                                              Jan 14, 2025 23:35:13.822594881 CET53350445192.168.2.5197.111.193.1
                                              Jan 14, 2025 23:35:13.822607994 CET53307445192.168.2.5108.170.252.1
                                              Jan 14, 2025 23:35:13.822644949 CET53370445192.168.2.574.178.121.2
                                              Jan 14, 2025 23:35:13.822669029 CET53376445192.168.2.5153.5.218.1
                                              Jan 14, 2025 23:35:13.822730064 CET53437445192.168.2.5133.205.133.2
                                              Jan 14, 2025 23:35:13.822746992 CET53451445192.168.2.569.170.172.1
                                              Jan 14, 2025 23:35:13.822809935 CET53431445192.168.2.5194.204.94.1
                                              Jan 14, 2025 23:35:13.822844028 CET53499445192.168.2.5148.13.134.2
                                              Jan 14, 2025 23:35:13.822957039 CET53509445192.168.2.5215.212.124.1
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 14, 2025 23:34:06.539483070 CET5480453192.168.2.51.1.1.1
                                              Jan 14, 2025 23:34:06.846317053 CET53548041.1.1.1192.168.2.5
                                              Jan 14, 2025 23:34:07.501362085 CET5238853192.168.2.51.1.1.1
                                              Jan 14, 2025 23:34:07.833739996 CET53523881.1.1.1192.168.2.5
                                              Jan 14, 2025 23:34:36.614125967 CET5355164162.159.36.2192.168.2.5
                                              Jan 14, 2025 23:34:37.081850052 CET6139153192.168.2.51.1.1.1
                                              Jan 14, 2025 23:34:37.202076912 CET53613911.1.1.1192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jan 14, 2025 23:34:06.539483070 CET192.168.2.51.1.1.10xeeStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                              Jan 14, 2025 23:34:07.501362085 CET192.168.2.51.1.1.10x181fStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                              Jan 14, 2025 23:34:37.081850052 CET192.168.2.51.1.1.10xe0d7Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jan 14, 2025 23:34:06.846317053 CET1.1.1.1192.168.2.50xeeNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                              Jan 14, 2025 23:34:07.833739996 CET1.1.1.1192.168.2.50x181fNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                              Jan 14, 2025 23:34:07.833739996 CET1.1.1.1192.168.2.50x181fNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                              Jan 14, 2025 23:34:37.202076912 CET1.1.1.1192.168.2.50xe0d7Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                              • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.549704103.224.212.215806052C:\Windows\mssecsvr.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 14, 2025 23:34:06.858745098 CET100OUTGET / HTTP/1.1
                                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              Cache-Control: no-cache
                                              Jan 14, 2025 23:34:07.495368004 CET365INHTTP/1.1 302 Found
                                              date: Tue, 14 Jan 2025 22:34:07 GMT
                                              server: Apache
                                              set-cookie: __tad=1736894047.2350906; expires=Fri, 12-Jan-2035 22:34:07 GMT; Max-Age=315360000
                                              location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0711-a4e9-cbca1637d94b
                                              content-length: 2
                                              content-type: text/html; charset=UTF-8
                                              connection: close
                                              Data Raw: 0a 0a
                                              Data Ascii:


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.549705199.59.243.228806052C:\Windows\mssecsvr.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 14, 2025 23:34:07.840545893 CET169OUTGET /?subid1=20250115-0934-0711-a4e9-cbca1637d94b HTTP/1.1
                                              Cache-Control: no-cache
                                              Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              Connection: Keep-Alive
                                              Jan 14, 2025 23:34:08.296755075 CET1236INHTTP/1.1 200 OK
                                              date: Tue, 14 Jan 2025 22:34:07 GMT
                                              content-type: text/html; charset=utf-8
                                              content-length: 1262
                                              x-request-id: 85d71e1c-462c-4976-95fa-24291f75e090
                                              cache-control: no-store, max-age=0
                                              accept-ch: sec-ch-prefers-color-scheme
                                              critical-ch: sec-ch-prefers-color-scheme
                                              vary: sec-ch-prefers-color-scheme
                                              x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_pMouMns6oqPMJVjW3PwXoyZprm0URO6gn4WRJa2vqCyakiNCo4NCABEiVevkRWFuuJ2gfDKCnbWDEX4tHH7dMQ==
                                              set-cookie: parking_session=85d71e1c-462c-4976-95fa-24291f75e090; expires=Tue, 14 Jan 2025 22:49:08 GMT; path=/
                                              Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 70 4d 6f 75 4d 6e 73 36 6f 71 50 4d 4a 56 6a 57 33 50 77 58 6f 79 5a 70 72 6d 30 55 52 4f 36 67 6e 34 57 52 4a 61 32 76 71 43 79 61 6b 69 4e 43 6f 34 4e 43 41 42 45 69 56 65 76 6b 52 57 46 75 75 4a 32 67 66 44 4b 43 6e 62 57 44 45 58 34 74 48 48 37 64 4d 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                              Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_pMouMns6oqPMJVjW3PwXoyZprm0URO6gn4WRJa2vqCyakiNCo4NCABEiVevkRWFuuJ2gfDKCnbWDEX4tHH7dMQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                              Jan 14, 2025 23:34:08.296819925 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                              Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiODVkNzFlMWMtNDYyYy00OTc2LTk1ZmEtMjQyOTFmNzVlMDkwIiwicGFnZV90aW1lIjoxNzM2ODk0MDQ4LCJwYWdlX3VybCI6I


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.549706103.224.212.215803480C:\Windows\mssecsvr.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 14, 2025 23:34:08.464134932 CET100OUTGET / HTTP/1.1
                                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              Cache-Control: no-cache
                                              Jan 14, 2025 23:34:09.108202934 CET365INHTTP/1.1 302 Found
                                              date: Tue, 14 Jan 2025 22:34:09 GMT
                                              server: Apache
                                              set-cookie: __tad=1736894049.2675295; expires=Fri, 12-Jan-2035 22:34:09 GMT; Max-Age=315360000
                                              location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-0970-8cc9-73b029fd529f
                                              content-length: 2
                                              content-type: text/html; charset=UTF-8
                                              connection: close
                                              Data Raw: 0a 0a
                                              Data Ascii:


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.549707199.59.243.228803480C:\Windows\mssecsvr.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 14, 2025 23:34:09.117826939 CET169OUTGET /?subid1=20250115-0934-0970-8cc9-73b029fd529f HTTP/1.1
                                              Cache-Control: no-cache
                                              Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              Connection: Keep-Alive
                                              Jan 14, 2025 23:34:09.661906004 CET1236INHTTP/1.1 200 OK
                                              date: Tue, 14 Jan 2025 22:34:09 GMT
                                              content-type: text/html; charset=utf-8
                                              content-length: 1262
                                              x-request-id: bc40c622-5cf6-4d4b-bf2d-91dd6236e110
                                              cache-control: no-store, max-age=0
                                              accept-ch: sec-ch-prefers-color-scheme
                                              critical-ch: sec-ch-prefers-color-scheme
                                              vary: sec-ch-prefers-color-scheme
                                              x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_dgmGXuX/BuiePdUBvAyYqZEdyxFfX6bU8PSZcgASAAzAguGdXTkwOAb8xSlmK0fFT2rKb+1KsooNoLML0yURzw==
                                              set-cookie: parking_session=bc40c622-5cf6-4d4b-bf2d-91dd6236e110; expires=Tue, 14 Jan 2025 22:49:09 GMT; path=/
                                              Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 64 67 6d 47 58 75 58 2f 42 75 69 65 50 64 55 42 76 41 79 59 71 5a 45 64 79 78 46 66 58 36 62 55 38 50 53 5a 63 67 41 53 41 41 7a 41 67 75 47 64 58 54 6b 77 4f 41 62 38 78 53 6c 6d 4b 30 66 46 54 32 72 4b 62 2b 31 4b 73 6f 6f 4e 6f 4c 4d 4c 30 79 55 52 7a 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                              Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_dgmGXuX/BuiePdUBvAyYqZEdyxFfX6bU8PSZcgASAAzAguGdXTkwOAb8xSlmK0fFT2rKb+1KsooNoLML0yURzw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                              Jan 14, 2025 23:34:09.661964893 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                              Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYmM0MGM2MjItNWNmNi00ZDRiLWJmMmQtOTFkZDYyMzZlMTEwIiwicGFnZV90aW1lIjoxNzM2ODk0MDQ5LCJwYWdlX3VybCI6I
                                              Jan 14, 2025 23:34:09.662003994 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                              Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYmM0MGM2MjItNWNmNi00ZDRiLWJmMmQtOTFkZDYyMzZlMTEwIiwicGFnZV90aW1lIjoxNzM2ODk0MDQ5LCJwYWdlX3VybCI6I


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.549708103.224.212.215803252C:\Windows\mssecsvr.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 14, 2025 23:34:09.401051044 CET134OUTGET / HTTP/1.1
                                              Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              Cache-Control: no-cache
                                              Cookie: __tad=1736894047.2350906
                                              Jan 14, 2025 23:34:10.014123917 CET269INHTTP/1.1 302 Found
                                              date: Tue, 14 Jan 2025 22:34:09 GMT
                                              server: Apache
                                              location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0934-09e1-a4d8-9386228033a7
                                              content-length: 2
                                              content-type: text/html; charset=UTF-8
                                              connection: close
                                              Data Raw: 0a 0a
                                              Data Ascii:


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.549717199.59.243.228803252C:\Windows\mssecsvr.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 14, 2025 23:34:10.022483110 CET231OUTGET /?subid1=20250115-0934-09e1-a4d8-9386228033a7 HTTP/1.1
                                              Cache-Control: no-cache
                                              Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              Connection: Keep-Alive
                                              Cookie: parking_session=85d71e1c-462c-4976-95fa-24291f75e090
                                              Jan 14, 2025 23:34:10.486355066 CET1236INHTTP/1.1 200 OK
                                              date: Tue, 14 Jan 2025 22:34:10 GMT
                                              content-type: text/html; charset=utf-8
                                              content-length: 1262
                                              x-request-id: 78e2f1aa-0108-48cf-b4d0-793584d700d0
                                              cache-control: no-store, max-age=0
                                              accept-ch: sec-ch-prefers-color-scheme
                                              critical-ch: sec-ch-prefers-color-scheme
                                              vary: sec-ch-prefers-color-scheme
                                              x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_RSJTUAtLeYO0dhcPOsA9mCHDwHJ4ntLB+vML21/3Au7A5YqxlSP1g1pXVsLL9MABZFFRz0wkxTc/0V6JtkRSrQ==
                                              set-cookie: parking_session=85d71e1c-462c-4976-95fa-24291f75e090; expires=Tue, 14 Jan 2025 22:49:10 GMT
                                              Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 52 53 4a 54 55 41 74 4c 65 59 4f 30 64 68 63 50 4f 73 41 39 6d 43 48 44 77 48 4a 34 6e 74 4c 42 2b 76 4d 4c 32 31 2f 33 41 75 37 41 35 59 71 78 6c 53 50 31 67 31 70 58 56 73 4c 4c 39 4d 41 42 5a 46 46 52 7a 30 77 6b 78 54 63 2f 30 56 36 4a 74 6b 52 53 72 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                              Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_RSJTUAtLeYO0dhcPOsA9mCHDwHJ4ntLB+vML21/3Au7A5YqxlSP1g1pXVsLL9MABZFFRz0wkxTc/0V6JtkRSrQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                              Jan 14, 2025 23:34:10.486418009 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                              Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiODVkNzFlMWMtNDYyYy00OTc2LTk1ZmEtMjQyOTFmNzVlMDkwIiwicGFnZV90aW1lIjoxNzM2ODk0MDUwLCJwYWdlX3VybCI6Imh0dHA6L


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:17:34:05
                                              Start date:14/01/2025
                                              Path:C:\Windows\System32\loaddll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:loaddll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll"
                                              Imagebase:0x4e0000
                                              File size:126'464 bytes
                                              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:1
                                              Start time:17:34:05
                                              Start date:14/01/2025
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6d64d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:2
                                              Start time:17:34:05
                                              Start date:14/01/2025
                                              Path:C:\Windows\SysWOW64\cmd.exe
                                              Wow64 process (32bit):true
                                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1
                                              Imagebase:0x790000
                                              File size:236'544 bytes
                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:3
                                              Start time:17:34:05
                                              Start date:14/01/2025
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\D3W41IdtQA.dll,PlayGame
                                              Imagebase:0x370000
                                              File size:61'440 bytes
                                              MD5 hash:889B99C52A60DD49227C5E485A016679
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:17:34:05
                                              Start date:14/01/2025
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",#1
                                              Imagebase:0x370000
                                              File size:61'440 bytes
                                              MD5 hash:889B99C52A60DD49227C5E485A016679
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:17:34:05
                                              Start date:14/01/2025
                                              Path:C:\Windows\mssecsvr.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\WINDOWS\mssecsvr.exe
                                              Imagebase:0x400000
                                              File size:2'281'472 bytes
                                              MD5 hash:8FFE5EAA2C7E7B68B68F70F7B2456C42
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2059116845.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.2059281038.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.2059281038.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                              Reputation:low
                                              Has exited:true

                                              Target ID:7
                                              Start time:17:34:07
                                              Start date:14/01/2025
                                              Path:C:\Windows\mssecsvr.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                              Imagebase:0x400000
                                              File size:2'281'472 bytes
                                              MD5 hash:8FFE5EAA2C7E7B68B68F70F7B2456C42
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2078455711.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000000.2078571904.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000000.2078571904.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2727456117.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2728292816.000000000227E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2728292816.000000000227E000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000007.00000002.2728081157.0000000001D57000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000007.00000002.2728081157.0000000001D57000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                              Reputation:low
                                              Has exited:true

                                              Target ID:8
                                              Start time:17:34:08
                                              Start date:14/01/2025
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\D3W41IdtQA.dll",PlayGame
                                              Imagebase:0x370000
                                              File size:61'440 bytes
                                              MD5 hash:889B99C52A60DD49227C5E485A016679
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:9
                                              Start time:17:34:08
                                              Start date:14/01/2025
                                              Path:C:\Windows\mssecsvr.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\WINDOWS\mssecsvr.exe
                                              Imagebase:0x400000
                                              File size:2'281'472 bytes
                                              MD5 hash:8FFE5EAA2C7E7B68B68F70F7B2456C42
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.2087741306.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.2100631986.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.2100631986.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.2100501122.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.2087872787.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                              • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.2087872787.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                              Reputation:low
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:71.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:63.2%
                                                Total number of Nodes:38
                                                Total number of Limit Nodes:9
                                                execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                                Callgraph

                                                Control-flow Graph

                                                APIs
                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                • sprintf.MSVCRT ref: 00407E01
                                                • sprintf.MSVCRT ref: 00407E18
                                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                • CreateProcessA.KERNELBASE ref: 00407EE8
                                                • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.2092644247.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000005.00000002.2092625262.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092668020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092820275.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                • API String ID: 4281112323-1507730452
                                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.2092644247.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000005.00000002.2092625262.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092668020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092820275.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                • String ID:
                                                • API String ID: 801014965-0
                                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                Control-flow Graph

                                                APIs
                                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                Strings
                                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.2092644247.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000005.00000002.2092625262.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092668020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092820275.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                • API String ID: 774561529-2614457033
                                                • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                Control-flow Graph

                                                APIs
                                                • sprintf.MSVCRT ref: 00407C56
                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.2092644247.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000005.00000002.2092625262.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092668020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092820275.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                                • API String ID: 3340711343-2450984573
                                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                Control-flow Graph

                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • __p___argc.MSVCRT ref: 004080A5
                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.2092644247.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000005.00000002.2092625262.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092668020.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092688099.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092820275.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.2092928985.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                • String ID: mssecsvc2.1
                                                • API String ID: 4274534310-2839763450
                                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                Execution Graph

                                                Execution Coverage:34.8%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:36
                                                Total number of Limit Nodes:2

                                                Callgraph

                                                Control-flow Graph

                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • __p___argc.MSVCRT ref: 004080A5
                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F370EF0,00000000,?,004081B2), ref: 004080DC
                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2727397258.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000007.00000002.2727384274.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727411276.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727456117.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727468720.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727481781.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                • String ID: mssecsvc2.1
                                                • API String ID: 4274534310-2839763450
                                                • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                Control-flow Graph

                                                APIs
                                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                  • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                  • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                Strings
                                                • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2727397258.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000007.00000002.2727384274.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727411276.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727456117.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727468720.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727481781.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                • API String ID: 774561529-2614457033
                                                • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                Control-flow Graph

                                                APIs
                                                • sprintf.MSVCRT ref: 00407C56
                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F370EF0,00000000), ref: 00407C9B
                                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2727397258.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000007.00000002.2727384274.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727411276.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727456117.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727468720.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727481781.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                                • API String ID: 3340711343-2450984573
                                                • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                                APIs
                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F370EF0,?,00000000), ref: 00407CEF
                                                • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                • sprintf.MSVCRT ref: 00407E01
                                                • sprintf.MSVCRT ref: 00407E18
                                                • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2727397258.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000007.00000002.2727384274.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727411276.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727456117.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727468720.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727481781.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                • API String ID: 4072214828-1507730452
                                                • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2727397258.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000007.00000002.2727384274.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727411276.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727423449.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727456117.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727468720.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727481781.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000007.00000002.2727557948.0000000000851000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_400000_mssecsvr.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                • String ID:
                                                • API String ID: 801014965-0
                                                • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59