Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
V01vdyUACe.dll

Overview

General Information

Sample name:V01vdyUACe.dll
renamed because original name is a hash value
Original sample name:99d5af136c5d863d5ba4cd5c964c9122.dll
Analysis ID:1591531
MD5:99d5af136c5d863d5ba4cd5c964c9122
SHA1:021776b034251555f25ace43b1061a444d5ba906
SHA256:893065e33bb4a2fa7597da335fecd52a0f098383186482478f0300c40e3be739
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7412 cmdline: loaddll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7460 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7488 cmdline: rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7512 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 9679BDFFCFC1DA1D852E8F218B335E78)
    • rundll32.exe (PID: 7472 cmdline: rundll32.exe C:\Users\user\Desktop\V01vdyUACe.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7640 cmdline: rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7656 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 9679BDFFCFC1DA1D852E8F218B335E78)
  • mssecsvc.exe (PID: 7584 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 9679BDFFCFC1DA1D852E8F218B335E78)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
V01vdyUACe.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    V01vdyUACe.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    V01vdyUACe.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      SourceRuleDescriptionAuthorStrings
      00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000006.00000000.1802755433.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000000.1802755433.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          00000008.00000002.1831457534.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000006.00000000.1801878238.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              6.2.mssecsvc.exe.1faf084.5.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              6.2.mssecsvc.exe.24da8c8.6.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              6.2.mssecsvc.exe.1fe1128.4.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
              • 0xe8d8:$x3: tasksche.exe
              • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
              • 0xe92c:$x5: WNcry@2ol7
              • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
              • 0xe82c:$s3: cmd.exe /c "%s"
              6.2.mssecsvc.exe.1fe1128.4.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
              • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
              • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
              6.2.mssecsvc.exe.250c96c.7.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                Click to see the 88 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:48.582698+010028033043Unknown Traffic192.168.2.449732103.224.212.21580TCP
                2025-01-15T03:04:50.516076+010028033043Unknown Traffic192.168.2.449734103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T03:04:47.643513+010028300181A Network Trojan was detected192.168.2.4556681.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: V01vdyUACe.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7f7Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f2Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d9429Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d94Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f250Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/wAvira URL Cloud: Label: malware
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 93%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 93%
                Source: V01vdyUACe.dllVirustotal: Detection: 92%Perma Link
                Source: V01vdyUACe.dllReversingLabs: Detection: 94%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: V01vdyUACe.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: V01vdyUACe.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.4:55668 -> 1.1.1.1:53
                Source: unknownNetwork traffic detected: IP country count 11
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-1304-48cb-ab27-b1d7f25d9429 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736906688.6242741
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-1304-5082-90f7-a7068eb2f250 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-1304-5151-bf6a-63383d41d7f7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=84ae1b42-84fc-4740-a603-6b20200136a7
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49732 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49734 -> 103.224.212.215:80
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.77
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.77
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.77
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.77
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 183.50.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.171
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.171
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.171
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.1
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.171
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.1
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.1
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.1
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.1
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.1
                Source: unknownTCP traffic detected without corresponding DNS query: 207.109.181.1
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.73
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.73
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.73
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.1
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.1
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.73
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.1
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.1
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.1
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.1
                Source: unknownTCP traffic detected without corresponding DNS query: 43.87.172.1
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.108
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.108
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.108
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.1
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.108
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.1
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.1
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.1
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.1
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.1
                Source: unknownTCP traffic detected without corresponding DNS query: 86.128.111.1
                Source: unknownTCP traffic detected without corresponding DNS query: 221.48.37.144
                Source: unknownTCP traffic detected without corresponding DNS query: 221.48.37.144
                Source: unknownTCP traffic detected without corresponding DNS query: 221.48.37.144
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-1304-48cb-ab27-b1d7f25d9429 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736906688.6242741
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-1304-5082-90f7-a7068eb2f250 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-1304-5151-bf6a-63383d41d7f7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=84ae1b42-84fc-4740-a603-6b20200136a7
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvc.exe, 00000008.00000002.1831803586.0000000000BD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgoYt
                Source: mssecsvc.exe, 00000005.00000002.1825468248.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.1825468248.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000003.1791193960.0000000000C87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d94
                Source: mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000003.1824588963.0000000000AFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2462264952.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f2
                Source: mssecsvc.exe, 00000008.00000002.1831803586.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.1828934040.0000000000BDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7
                Source: mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/w
                Source: V01vdyUACe.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvc.exe, 00000005.00000002.1825468248.0000000000C1E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1831803586.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1831803586.0000000000B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvc.exe, 00000005.00000002.1825468248.0000000000C78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/#
                Source: mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/(
                Source: mssecsvc.exe, 00000008.00000002.1831803586.0000000000B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/1U
                Source: mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/8
                Source: mssecsvc.exe, 00000008.00000002.1831803586.0000000000BB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Xt
                Source: mssecsvc.exe, 00000005.00000002.1825468248.0000000000C61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Y
                Source: mssecsvc.exe, 00000006.00000002.2461099749.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvc.exe, 00000008.00000002.1831803586.0000000000B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comNn
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: V01vdyUACe.dll, type: SAMPLE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.250c96c.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.1fe1128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.1fbe104.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.24e9948.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.24e58e8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.1faf084.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.1fba0a4.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.24da8c8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.1fbe104.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvc.exe.24e9948.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1802755433.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1831457534.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1801878238.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1809549232.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1831588866.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2461661387.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1809283291.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.1779970986.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2463708479.00000000024E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2463448129.0000000001FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.1780101745.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7584, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7656, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                System Summary

                barindex
                Source: V01vdyUACe.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: V01vdyUACe.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.1faf084.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.24da8c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.1fe1128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.1fe1128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.250c96c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.250c96c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.250c96c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.250c96c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.1fe1128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.1fe1128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.1fbe104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.1fbe104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.1fbe104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.24e9948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.24e9948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.24e9948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.24e58e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.24e58e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.1faf084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.1faf084.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvc.exe.1faf084.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.1fba0a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.1fba0a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.24da8c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.24da8c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.1fbe104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.1fbe104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvc.exe.24e9948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvc.exe.24e9948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1802755433.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1809549232.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.1831588866.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2463708479.00000000024E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2463448129.0000000001FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000000.1780101745.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: tasksche.exe.5.drStatic PE information: No import functions for PE file found
                Source: V01vdyUACe.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: V01vdyUACe.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: V01vdyUACe.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.1faf084.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.24da8c8.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.1fe1128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.1fe1128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.250c96c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.250c96c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.250c96c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.250c96c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.1fe1128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.1fe1128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.1fbe104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.1fbe104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.1fbe104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.24e9948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.24e9948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.24e9948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.24e58e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.24e58e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.1faf084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.1faf084.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvc.exe.1faf084.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.1fba0a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.1fba0a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.24da8c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.24da8c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.1fbe104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.1fbe104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvc.exe.24e9948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvc.exe.24e9948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1802755433.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1809549232.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.1831588866.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2463708479.00000000024E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2463448129.0000000001FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000000.1780101745.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: tasksche.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: tasksche.exe.5.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                Source: tasksche.exe.5.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                Source: tasksche.exe.5.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                Source: V01vdyUACe.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
                Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvc.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
                Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7420:120:WilError_03
                Source: V01vdyUACe.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V01vdyUACe.dll,PlayGame
                Source: V01vdyUACe.dllVirustotal: Detection: 92%
                Source: V01vdyUACe.dllReversingLabs: Detection: 94%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V01vdyUACe.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V01vdyUACe.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: V01vdyUACe.dllStatic file information: File size 5267459 > 1048576
                Source: V01vdyUACe.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: tasksche.exe.5.drStatic PE information: section name: .text entropy: 7.629756223800418

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvc.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvc.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvc.exe TID: 7700Thread sleep count: 93 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7700Thread sleep time: -186000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7704Thread sleep count: 127 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7704Thread sleep count: 38 > 30Jump to behavior
                Source: C:\Windows\mssecsvc.exe TID: 7700Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvc.exe, 00000006.00000002.2462264952.0000000000ABC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                Source: mssecsvc.exe, 00000005.00000002.1825468248.0000000000C78000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000003.1824878869.0000000000AFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000003.1824588963.0000000000AFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2462264952.0000000000AFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1831803586.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1831803586.0000000000B78000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.1831803586.0000000000BD1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvc.exe, 00000005.00000002.1825468248.0000000000C4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp3
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1Jump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591531 Sample: V01vdyUACe.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 36 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->38 40 77026.bodis.com 2->40 48 Suricata IDS alerts for network traffic 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for URL or domain 2->52 54 7 other signatures 2->54 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 12 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        18 cmd.exe 1 9->18         started        20 conhost.exe 9->20         started        22 rundll32.exe 1 9->22         started        42 192.168.2.100 unknown unknown 11->42 44 192.168.2.101 unknown unknown 11->44 46 98 other IPs or domains 11->46 56 Connects to many different private IPs via SMB (likely to spread or exploit) 11->56 58 Connects to many different private IPs (likely to spread or exploit) 11->58 signatures6 process7 signatures8 60 Drops executables to the windows directory (C:\Windows) and starts them 15->60 24 mssecsvc.exe 13 15->24         started        27 rundll32.exe 18->27         started        process9 file10 32 C:\WINDOWS\qeriuwjhrf (copy), PE32 24->32 dropped 29 mssecsvc.exe 13 27->29         started        process11 file12 34 C:\Windows\tasksche.exe, PE32 29->34 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                V01vdyUACe.dll93%VirustotalBrowse
                V01vdyUACe.dll95%ReversingLabsWin32.Ransomware.WannaCry
                V01vdyUACe.dll100%AviraTR/AD.WannaCry.cxhsa
                V01vdyUACe.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)93%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe93%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7f7100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgoYt0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f2100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comNn0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d9429100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d94100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f250100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/w100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    high
                    ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d9429false
                      • Avira URL Cloud: malware
                      unknown
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7f7false
                      • Avira URL Cloud: malware
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                        high
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f250false
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comNnmssecsvc.exe, 00000008.00000002.1831803586.0000000000B78000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/(mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comV01vdyUACe.dllfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/wmssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f2mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000003.1824588963.0000000000AFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.2462264952.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/1Umssecsvc.exe, 00000008.00000002.1831803586.0000000000B78000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7mssecsvc.exe, 00000008.00000002.1831803586.0000000000BB0000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.1828934040.0000000000BDC000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/#mssecsvc.exe, 00000005.00000002.1825468248.0000000000C78000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Xtmssecsvc.exe, 00000008.00000002.1831803586.0000000000BB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ww25.iuqerfsodp9ifjaposdfjhgoYtmssecsvc.exe, 00000008.00000002.1831803586.0000000000BD1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d94mssecsvc.exe, 00000005.00000002.1825468248.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000002.1825468248.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000005.00000003.1791193960.0000000000C87000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvc.exe, 00000006.00000002.2461099749.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/8mssecsvc.exe, 00000006.00000002.2462264952.0000000000ACA000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Ymssecsvc.exe, 00000005.00000002.1825468248.0000000000C61000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        38.133.158.54
                                        unknownUnited States
                                        40618SESAMEUSfalse
                                        202.72.145.1
                                        unknownAustralia
                                        9543WESTNET-AS-APWestnetInternetServicesAUfalse
                                        2.126.104.1
                                        unknownUnited Kingdom
                                        5607BSKYB-BROADBAND-ASGBfalse
                                        163.159.85.24
                                        unknownSlovenia
                                        15435KABELFOONDELTAFiberNederlandNLfalse
                                        202.14.161.67
                                        unknownIndia
                                        131458WILLIAMSLEA-AS-APWILLIAMSLEAINDIAPRIVATELIMITEDINfalse
                                        57.176.241.137
                                        unknownBelgium
                                        2686ATGS-MMD-ASUSfalse
                                        148.155.59.221
                                        unknownUnited States
                                        18715NYPAUSfalse
                                        207.109.181.2
                                        unknownUnited States
                                        397973CDS-GLOBAL-01USfalse
                                        207.109.181.1
                                        unknownUnited States
                                        397973CDS-GLOBAL-01USfalse
                                        183.50.126.1
                                        unknownChina
                                        4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                        183.50.126.2
                                        unknownChina
                                        4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                        122.116.214.234
                                        unknownTaiwan; Republic of China (ROC)
                                        3462HINETDataCommunicationBusinessGroupTWfalse
                                        182.88.71.1
                                        unknownChina
                                        4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                        38.133.158.1
                                        unknownUnited States
                                        40618SESAMEUSfalse
                                        45.97.165.121
                                        unknownEgypt
                                        37069MOBINILEGfalse
                                        39.122.246.1
                                        unknownKorea Republic of
                                        9318SKB-ASSKBroadbandCoLtdKRfalse
                                        IP
                                        192.168.2.148
                                        192.168.2.149
                                        192.168.2.146
                                        192.168.2.147
                                        192.168.2.140
                                        192.168.2.141
                                        192.168.2.144
                                        192.168.2.145
                                        192.168.2.142
                                        192.168.2.143
                                        192.168.2.159
                                        192.168.2.157
                                        192.168.2.158
                                        192.168.2.151
                                        192.168.2.152
                                        192.168.2.150
                                        192.168.2.155
                                        192.168.2.156
                                        192.168.2.153
                                        192.168.2.154
                                        192.168.2.126
                                        192.168.2.247
                                        192.168.2.127
                                        192.168.2.248
                                        192.168.2.124
                                        192.168.2.245
                                        192.168.2.125
                                        192.168.2.246
                                        192.168.2.128
                                        192.168.2.249
                                        192.168.2.129
                                        192.168.2.240
                                        192.168.2.122
                                        192.168.2.243
                                        192.168.2.123
                                        192.168.2.244
                                        192.168.2.120
                                        192.168.2.241
                                        192.168.2.121
                                        192.168.2.242
                                        192.168.2.97
                                        192.168.2.137
                                        192.168.2.96
                                        192.168.2.138
                                        192.168.2.99
                                        192.168.2.135
                                        192.168.2.98
                                        192.168.2.136
                                        192.168.2.139
                                        192.168.2.250
                                        192.168.2.130
                                        192.168.2.251
                                        192.168.2.91
                                        192.168.2.90
                                        192.168.2.93
                                        192.168.2.133
                                        192.168.2.254
                                        192.168.2.92
                                        192.168.2.134
                                        192.168.2.95
                                        192.168.2.131
                                        192.168.2.252
                                        192.168.2.94
                                        192.168.2.132
                                        192.168.2.253
                                        192.168.2.104
                                        192.168.2.225
                                        192.168.2.105
                                        192.168.2.226
                                        192.168.2.102
                                        192.168.2.223
                                        192.168.2.103
                                        192.168.2.224
                                        192.168.2.108
                                        192.168.2.229
                                        192.168.2.109
                                        192.168.2.106
                                        192.168.2.227
                                        192.168.2.107
                                        192.168.2.228
                                        192.168.2.100
                                        192.168.2.221
                                        192.168.2.101
                                        192.168.2.222
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1591531
                                        Start date and time:2025-01-15 03:03:45 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 19s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:13
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:V01vdyUACe.dll
                                        renamed because original name is a hash value
                                        Original Sample Name:99d5af136c5d863d5ba4cd5c964c9122.dll
                                        Detection:MAL
                                        Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:Failed
                                        Cookbook Comments:
                                        • Found application associated with file extension: .dll
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                        • Excluded IPs from analysis (whitelisted): 199.232.210.172, 184.30.131.245, 4.245.163.56, 13.107.246.45
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        21:04:49API Interceptor1x Sleep call for process: loaddll32.exe modified
                                        21:05:25API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        77026.bodis.comNLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                        • 199.59.243.228
                                        www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comNLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                        • 103.224.212.215
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        WILLIAMSLEA-AS-APWILLIAMSLEAINDIAPRIVATELIMITEDINm68k.elfGet hashmaliciousUnknownBrowse
                                        • 103.38.51.254
                                        skyljnee.arm-20240128-0910.elfGet hashmaliciousMiraiBrowse
                                        • 202.14.176.0
                                        pxObBd1d8a.elfGet hashmaliciousMiraiBrowse
                                        • 202.14.176.4
                                        SecuriteInfo.com.Linux.Siggen.9999.14754.14903Get hashmaliciousMiraiBrowse
                                        • 202.14.176.4
                                        ZG9zarmGet hashmaliciousMiraiBrowse
                                        • 202.14.176.1
                                        x86Get hashmaliciousMiraiBrowse
                                        • 103.38.51.242
                                        GujVgIhAhFGet hashmaliciousMiraiBrowse
                                        • 103.38.51.250
                                        sora.armGet hashmaliciousMiraiBrowse
                                        • 103.38.51.243
                                        KABELFOONDELTAFiberNederlandNLsplarm.elfGet hashmaliciousUnknownBrowse
                                        • 163.158.28.14
                                        star.ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 62.45.21.194
                                        la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                        • 163.159.107.147
                                        bin.sh.elfGet hashmaliciousMiraiBrowse
                                        • 159.180.12.14
                                        arm7.elfGet hashmaliciousMiraiBrowse
                                        • 159.180.12.20
                                        xd.mips.elfGet hashmaliciousMiraiBrowse
                                        • 163.159.107.112
                                        nabx86.elfGet hashmaliciousUnknownBrowse
                                        • 163.159.77.51
                                        la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                        • 163.159.104.24
                                        la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                        • 163.158.223.243
                                        m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 163.159.12.150
                                        WESTNET-AS-APWestnetInternetServicesAU6.elfGet hashmaliciousUnknownBrowse
                                        • 58.6.150.64
                                        powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 202.72.179.118
                                        elitebotnet.arm5.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 202.173.131.6
                                        sh4.elfGet hashmaliciousMiraiBrowse
                                        • 202.173.131.4
                                        sora.ppc.elfGet hashmaliciousMiraiBrowse
                                        • 202.173.131.5
                                        na.elfGet hashmaliciousMiraiBrowse
                                        • 202.72.153.69
                                        pur361ECCi.elfGet hashmaliciousMiraiBrowse
                                        • 58.6.198.48
                                        92.249.48.47-skid.ppc-2024-07-20T09_04_20.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 58.6.149.97
                                        VrTXQBQPLv.elfGet hashmaliciousMiraiBrowse
                                        • 58.6.198.23
                                        Ns1xkTsDQO.elfGet hashmaliciousMiraiBrowse
                                        • 202.72.153.60
                                        BSKYB-BROADBAND-ASGB9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                                        • 94.12.91.1
                                        ruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                                        • 90.207.146.203
                                        x86.elfGet hashmaliciousUnknownBrowse
                                        • 2.218.141.115
                                        i486.elfGet hashmaliciousUnknownBrowse
                                        • 90.217.19.173
                                        meth14.elfGet hashmaliciousMiraiBrowse
                                        • 2.216.236.49
                                        sh4.elfGet hashmaliciousUnknownBrowse
                                        • 176.254.67.238
                                        elitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 176.26.210.220
                                        elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 78.86.224.209
                                        elitebotnet.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 94.194.149.73
                                        res.mpsl.elfGet hashmaliciousUnknownBrowse
                                        • 176.254.218.204
                                        No context
                                        No context
                                        Process:C:\Windows\mssecsvc.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2061938
                                        Entropy (8bit):4.48308667683592
                                        Encrypted:false
                                        SSDEEP:12288:ntgQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjEXFGeXE3Tb:tgQhfdmMSirYbcMNgef0QeQjG/
                                        MD5:ED22CE8D03352290D9AE3C16F226775F
                                        SHA1:7D3CBF9CE6F11F583D6FAB85652BE8DEED186D7F
                                        SHA-256:0803D5ABAA188C990F4F9731E292D405A3B83835847235523DE4D1597A548746
                                        SHA-512:53D1D819C25ECC91E239F47B099A88F621B67F1B51CBC74F9E825D64A6CD1E6851C821DEAD2B06BC68F5C50E58EAF608330DDC61F8C68A320EF95539CD3B0F05
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 93%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\mssecsvc.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2061938
                                        Entropy (8bit):4.48308667683592
                                        Encrypted:false
                                        SSDEEP:12288:ntgQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjEXFGeXE3Tb:tgQhfdmMSirYbcMNgef0QeQjG/
                                        MD5:ED22CE8D03352290D9AE3C16F226775F
                                        SHA1:7D3CBF9CE6F11F583D6FAB85652BE8DEED186D7F
                                        SHA-256:0803D5ABAA188C990F4F9731E292D405A3B83835847235523DE4D1597A548746
                                        SHA-512:53D1D819C25ECC91E239F47B099A88F621B67F1B51CBC74F9E825D64A6CD1E6851C821DEAD2B06BC68F5C50E58EAF608330DDC61F8C68A320EF95539CD3B0F05
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                        • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 93%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):2.3164240424143285
                                        TrID:
                                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                        • DOS Executable Generic (2002/1) 0.20%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:V01vdyUACe.dll
                                        File size:5'267'459 bytes
                                        MD5:99d5af136c5d863d5ba4cd5c964c9122
                                        SHA1:021776b034251555f25ace43b1061a444d5ba906
                                        SHA256:893065e33bb4a2fa7597da335fecd52a0f098383186482478f0300c40e3be739
                                        SHA512:897a05d09e722abab0e5b0de0bf7212701ef43cd3e062302bd3a729d692b28b4e35405f23f7bdbd0fbbc9df27c25564a33b538ae56e43b05e6a3f01e1ea66231
                                        SSDEEP:12288:yvbLgPluCtgQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjEy:SbLgdrgQhfdmMSirYbcMNgef0QeQjG/
                                        TLSH:BB36239975AC90F8D10A63B5B4778A26A2B37C9E31BD970F9B9087610C03790BF64F53
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                        Icon Hash:7ae282899bbab082
                                        Entrypoint:0x100011e9
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x10000000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                        DLL Characteristics:
                                        Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                        Instruction
                                        push ebp
                                        mov ebp, esp
                                        push ebx
                                        mov ebx, dword ptr [ebp+08h]
                                        push esi
                                        mov esi, dword ptr [ebp+0Ch]
                                        push edi
                                        mov edi, dword ptr [ebp+10h]
                                        test esi, esi
                                        jne 00007FE2C485D9FBh
                                        cmp dword ptr [10003140h], 00000000h
                                        jmp 00007FE2C485DA18h
                                        cmp esi, 01h
                                        je 00007FE2C485D9F7h
                                        cmp esi, 02h
                                        jne 00007FE2C485DA14h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007FE2C485D9FBh
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        test eax, eax
                                        je 00007FE2C485D9FEh
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007FE2C485D90Ah
                                        test eax, eax
                                        jne 00007FE2C485D9F6h
                                        xor eax, eax
                                        jmp 00007FE2C485DA40h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007FE2C485D7BCh
                                        cmp esi, 01h
                                        mov dword ptr [ebp+0Ch], eax
                                        jne 00007FE2C485D9FEh
                                        test eax, eax
                                        jne 00007FE2C485DA29h
                                        push edi
                                        push eax
                                        push ebx
                                        call 00007FE2C485D8E6h
                                        test esi, esi
                                        je 00007FE2C485D9F7h
                                        cmp esi, 03h
                                        jne 00007FE2C485DA18h
                                        push edi
                                        push esi
                                        push ebx
                                        call 00007FE2C485D8D5h
                                        test eax, eax
                                        jne 00007FE2C485D9F5h
                                        and dword ptr [ebp+0Ch], eax
                                        cmp dword ptr [ebp+0Ch], 00000000h
                                        je 00007FE2C485DA03h
                                        mov eax, dword ptr [10003150h]
                                        test eax, eax
                                        je 00007FE2C485D9FAh
                                        push edi
                                        push esi
                                        push ebx
                                        call eax
                                        mov dword ptr [ebp+0Ch], eax
                                        mov eax, dword ptr [ebp+0Ch]
                                        pop edi
                                        pop esi
                                        pop ebx
                                        pop ebp
                                        retn 000Ch
                                        jmp dword ptr [10002028h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        Programming Language:
                                        • [ C ] VS98 (6.0) build 8168
                                        • [C++] VS98 (6.0) build 8168
                                        • [RES] VS98 (6.0) cvtres build 1720
                                        • [LNK] VS98 (6.0) imp/exp build 8168
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x40000x5000600x50100084a674cf85b17b4f109730288a595875unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        W0x40600x500000dataEnglishUnited States0.8783693313598633
                                        DLLImport
                                        KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                        MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                        NameOrdinalAddress
                                        PlayGame10x10001114
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-15T03:04:47.643513+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.4556681.1.1.153UDP
                                        2025-01-15T03:04:48.582698+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449732103.224.212.21580TCP
                                        2025-01-15T03:04:50.516076+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449734103.224.212.21580TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 15, 2025 03:04:42.812556982 CET49675443192.168.2.4173.222.162.32
                                        Jan 15, 2025 03:04:47.968579054 CET4973280192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:47.974178076 CET8049732103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:47.974309921 CET4973280192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:47.974740982 CET4973280192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:47.980319023 CET8049732103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:48.582285881 CET8049732103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:48.582633018 CET8049732103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:48.582698107 CET4973280192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:48.582698107 CET4973280192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:48.586515903 CET4973280192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:48.591418982 CET8049732103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:48.772672892 CET4973380192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:48.777609110 CET8049733199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:48.777686119 CET4973380192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:48.777930021 CET4973380192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:48.782771111 CET8049733199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:49.271224022 CET8049733199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:49.271244049 CET8049733199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:49.271284103 CET4973380192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:49.271320105 CET4973380192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:49.319520950 CET4973380192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:49.319540977 CET4973380192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:49.850689888 CET4973480192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:49.855612993 CET8049734103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:49.856250048 CET4973480192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:49.856250048 CET4973480192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:49.861090899 CET8049734103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:49.908143997 CET44349730173.222.162.32192.168.2.4
                                        Jan 15, 2025 03:04:49.908232927 CET49730443192.168.2.4173.222.162.32
                                        Jan 15, 2025 03:04:50.516004086 CET8049734103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:50.516076088 CET4973480192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:50.516083002 CET8049734103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:50.516196966 CET4973480192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:50.519172907 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:50.520064116 CET4973480192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:50.523217916 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:50.524060965 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:50.524604082 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:50.524604082 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:50.524863958 CET8049734103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:50.528073072 CET8049736199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:50.528126955 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:50.528528929 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:50.529508114 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:50.533407927 CET8049736199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.859368086 CET8049736199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.859385014 CET8049736199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.859461069 CET8049736199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.859576941 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.859576941 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.859651089 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:51.859659910 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:51.859668970 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:51.859839916 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:51.859839916 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:51.860030890 CET8049736199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.860227108 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.860321045 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:51.860359907 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:51.860460997 CET8049736199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.860506058 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:51.860591888 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.860593081 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:51.867327929 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.867327929 CET4973680192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.880352974 CET4973580192.168.2.4103.224.212.215
                                        Jan 15, 2025 03:04:51.885200977 CET8049735103.224.212.215192.168.2.4
                                        Jan 15, 2025 03:04:51.890871048 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.895720959 CET8049737199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.895854950 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.896326065 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:51.901096106 CET8049737199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:51.947724104 CET49738445192.168.2.4183.50.126.77
                                        Jan 15, 2025 03:04:51.952605009 CET44549738183.50.126.77192.168.2.4
                                        Jan 15, 2025 03:04:51.952668905 CET49738445192.168.2.4183.50.126.77
                                        Jan 15, 2025 03:04:51.952718019 CET49738445192.168.2.4183.50.126.77
                                        Jan 15, 2025 03:04:51.957613945 CET44549738183.50.126.77192.168.2.4
                                        Jan 15, 2025 03:04:51.957659960 CET49738445192.168.2.4183.50.126.77
                                        Jan 15, 2025 03:04:51.965727091 CET49739445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:04:51.970534086 CET44549739183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:04:51.970594883 CET49739445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:04:51.971199036 CET49739445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:04:51.973762035 CET49740445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:04:51.975965023 CET44549739183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:04:51.976011038 CET49739445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:04:51.978506088 CET44549740183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:04:51.978560925 CET49740445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:04:51.978595018 CET49740445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:04:51.983350039 CET44549740183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:04:52.354362965 CET8049737199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:52.354386091 CET8049737199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:52.354587078 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:52.354588032 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:52.373532057 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:52.373532057 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:52.381161928 CET8049737199.59.243.228192.168.2.4
                                        Jan 15, 2025 03:04:52.381513119 CET4973780192.168.2.4199.59.243.228
                                        Jan 15, 2025 03:04:53.875516891 CET49730443192.168.2.4173.222.162.32
                                        Jan 15, 2025 03:04:53.880315065 CET44349730173.222.162.32192.168.2.4
                                        Jan 15, 2025 03:04:53.939501047 CET49764445192.168.2.4207.109.181.171
                                        Jan 15, 2025 03:04:53.944283009 CET44549764207.109.181.171192.168.2.4
                                        Jan 15, 2025 03:04:53.944360018 CET49764445192.168.2.4207.109.181.171
                                        Jan 15, 2025 03:04:53.944412947 CET49764445192.168.2.4207.109.181.171
                                        Jan 15, 2025 03:04:53.944927931 CET49765445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:04:53.949249029 CET44549764207.109.181.171192.168.2.4
                                        Jan 15, 2025 03:04:53.949320078 CET49764445192.168.2.4207.109.181.171
                                        Jan 15, 2025 03:04:53.949680090 CET44549765207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:04:53.949737072 CET49765445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:04:53.949796915 CET49765445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:04:53.950814962 CET49766445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:04:53.954725981 CET44549765207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:04:53.954766989 CET49765445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:04:53.955573082 CET44549766207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:04:53.955626011 CET49766445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:04:53.955662966 CET49766445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:04:53.960436106 CET44549766207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:04:55.955368996 CET49791445192.168.2.443.87.172.73
                                        Jan 15, 2025 03:04:55.964693069 CET4454979143.87.172.73192.168.2.4
                                        Jan 15, 2025 03:04:55.964766979 CET49791445192.168.2.443.87.172.73
                                        Jan 15, 2025 03:04:55.964864969 CET49791445192.168.2.443.87.172.73
                                        Jan 15, 2025 03:04:55.965061903 CET49792445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:04:55.972028017 CET4454979243.87.172.1192.168.2.4
                                        Jan 15, 2025 03:04:55.972059965 CET4454979143.87.172.73192.168.2.4
                                        Jan 15, 2025 03:04:55.972100019 CET49792445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:04:55.972114086 CET49791445192.168.2.443.87.172.73
                                        Jan 15, 2025 03:04:55.972220898 CET49792445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:04:55.973352909 CET49793445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:04:55.977216959 CET4454979243.87.172.1192.168.2.4
                                        Jan 15, 2025 03:04:55.977274895 CET49792445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:04:55.978137970 CET4454979343.87.172.1192.168.2.4
                                        Jan 15, 2025 03:04:55.978193998 CET49793445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:04:55.978256941 CET49793445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:04:55.983014107 CET4454979343.87.172.1192.168.2.4
                                        Jan 15, 2025 03:04:58.008662939 CET49814445192.168.2.486.128.111.108
                                        Jan 15, 2025 03:04:58.013776064 CET4454981486.128.111.108192.168.2.4
                                        Jan 15, 2025 03:04:58.019162893 CET49814445192.168.2.486.128.111.108
                                        Jan 15, 2025 03:04:58.019582987 CET49814445192.168.2.486.128.111.108
                                        Jan 15, 2025 03:04:58.019829035 CET49815445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:04:58.024558067 CET4454981486.128.111.108192.168.2.4
                                        Jan 15, 2025 03:04:58.024646044 CET4454981586.128.111.1192.168.2.4
                                        Jan 15, 2025 03:04:58.024696112 CET49814445192.168.2.486.128.111.108
                                        Jan 15, 2025 03:04:58.024735928 CET49815445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:04:58.025907993 CET49815445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:04:58.030781031 CET4454981586.128.111.1192.168.2.4
                                        Jan 15, 2025 03:04:58.030889034 CET49815445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:04:58.033130884 CET49816445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:04:58.037925959 CET4454981686.128.111.1192.168.2.4
                                        Jan 15, 2025 03:04:58.038116932 CET49816445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:04:58.038259029 CET49816445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:04:58.043040037 CET4454981686.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:00.010895967 CET49838445192.168.2.4221.48.37.144
                                        Jan 15, 2025 03:05:00.015892029 CET44549838221.48.37.144192.168.2.4
                                        Jan 15, 2025 03:05:00.015971899 CET49838445192.168.2.4221.48.37.144
                                        Jan 15, 2025 03:05:00.032730103 CET49838445192.168.2.4221.48.37.144
                                        Jan 15, 2025 03:05:00.037560940 CET44549838221.48.37.144192.168.2.4
                                        Jan 15, 2025 03:05:00.039134026 CET49838445192.168.2.4221.48.37.144
                                        Jan 15, 2025 03:05:00.045986891 CET49839445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:00.050870895 CET44549839221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:00.050925016 CET49839445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:00.051100016 CET49839445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:00.052479029 CET49841445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:00.056204081 CET44549839221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:00.056255102 CET49839445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:00.057534933 CET44549841221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:00.057591915 CET49841445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:00.057703972 CET49841445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:00.062453032 CET44549841221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:02.016968966 CET49864445192.168.2.445.97.165.121
                                        Jan 15, 2025 03:05:02.021843910 CET4454986445.97.165.121192.168.2.4
                                        Jan 15, 2025 03:05:02.021950006 CET49864445192.168.2.445.97.165.121
                                        Jan 15, 2025 03:05:02.022051096 CET49864445192.168.2.445.97.165.121
                                        Jan 15, 2025 03:05:02.022376060 CET49865445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:02.026890039 CET4454986445.97.165.121192.168.2.4
                                        Jan 15, 2025 03:05:02.026967049 CET49864445192.168.2.445.97.165.121
                                        Jan 15, 2025 03:05:02.027235985 CET4454986545.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:02.027297020 CET49865445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:02.027331114 CET49865445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:02.028352022 CET49866445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:02.032224894 CET4454986545.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:02.032413006 CET49865445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:02.033137083 CET4454986645.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:02.033242941 CET49866445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:02.033399105 CET49866445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:02.038198948 CET4454986645.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:04.031687021 CET49888445192.168.2.4155.195.218.76
                                        Jan 15, 2025 03:05:04.039064884 CET44549888155.195.218.76192.168.2.4
                                        Jan 15, 2025 03:05:04.039144039 CET49888445192.168.2.4155.195.218.76
                                        Jan 15, 2025 03:05:04.039176941 CET49888445192.168.2.4155.195.218.76
                                        Jan 15, 2025 03:05:04.039360046 CET49889445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:04.045522928 CET44549888155.195.218.76192.168.2.4
                                        Jan 15, 2025 03:05:04.045576096 CET49888445192.168.2.4155.195.218.76
                                        Jan 15, 2025 03:05:04.045900106 CET44549889155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:04.045949936 CET49889445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:04.045977116 CET49889445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:04.046211004 CET49890445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:04.052421093 CET44549889155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:04.052472115 CET49889445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:04.052772999 CET44549890155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:04.052841902 CET49890445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:04.052880049 CET49890445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:04.059137106 CET44549890155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:06.047408104 CET49913445192.168.2.435.65.202.214
                                        Jan 15, 2025 03:05:06.052249908 CET4454991335.65.202.214192.168.2.4
                                        Jan 15, 2025 03:05:06.052417994 CET49913445192.168.2.435.65.202.214
                                        Jan 15, 2025 03:05:06.052526951 CET49914445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:06.052529097 CET49913445192.168.2.435.65.202.214
                                        Jan 15, 2025 03:05:06.057360888 CET4454991435.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:06.057399035 CET4454991335.65.202.214192.168.2.4
                                        Jan 15, 2025 03:05:06.057455063 CET49914445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:06.057486057 CET49913445192.168.2.435.65.202.214
                                        Jan 15, 2025 03:05:06.057501078 CET49914445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:06.057920933 CET49915445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:06.062459946 CET4454991435.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:06.062552929 CET49914445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:06.062776089 CET4454991535.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:06.062839985 CET49915445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:06.062886953 CET49915445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:06.067634106 CET4454991535.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:08.063244104 CET49937445192.168.2.4199.24.168.198
                                        Jan 15, 2025 03:05:08.068151951 CET44549937199.24.168.198192.168.2.4
                                        Jan 15, 2025 03:05:08.068253040 CET49937445192.168.2.4199.24.168.198
                                        Jan 15, 2025 03:05:08.068322897 CET49937445192.168.2.4199.24.168.198
                                        Jan 15, 2025 03:05:08.068461895 CET49938445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:08.073322058 CET44549938199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:08.073379040 CET44549937199.24.168.198192.168.2.4
                                        Jan 15, 2025 03:05:08.073401928 CET49938445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:08.073424101 CET49938445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:08.073719978 CET49939445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:08.073719978 CET49937445192.168.2.4199.24.168.198
                                        Jan 15, 2025 03:05:08.078438044 CET44549938199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:08.078491926 CET49938445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:08.078572035 CET44549939199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:08.078638077 CET49939445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:08.078674078 CET49939445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:08.083528996 CET44549939199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:10.078564882 CET49962445192.168.2.478.189.127.38
                                        Jan 15, 2025 03:05:10.084469080 CET4454996278.189.127.38192.168.2.4
                                        Jan 15, 2025 03:05:10.084543943 CET49962445192.168.2.478.189.127.38
                                        Jan 15, 2025 03:05:10.084557056 CET49962445192.168.2.478.189.127.38
                                        Jan 15, 2025 03:05:10.084784985 CET49963445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:10.090490103 CET4454996378.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:10.090575933 CET49963445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:10.090598106 CET49963445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:10.090662956 CET4454996278.189.127.38192.168.2.4
                                        Jan 15, 2025 03:05:10.090704918 CET49962445192.168.2.478.189.127.38
                                        Jan 15, 2025 03:05:10.090918064 CET49964445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:10.095412970 CET4454996378.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:10.095532894 CET49963445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:10.095693111 CET4454996478.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:10.095757008 CET49964445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:10.095776081 CET49964445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:10.102191925 CET4454996478.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:12.095835924 CET49986445192.168.2.412.102.136.164
                                        Jan 15, 2025 03:05:12.101012945 CET4454998612.102.136.164192.168.2.4
                                        Jan 15, 2025 03:05:12.101083994 CET49986445192.168.2.412.102.136.164
                                        Jan 15, 2025 03:05:12.101154089 CET49986445192.168.2.412.102.136.164
                                        Jan 15, 2025 03:05:12.101284981 CET49988445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:12.106040001 CET4454998612.102.136.164192.168.2.4
                                        Jan 15, 2025 03:05:12.106086969 CET49986445192.168.2.412.102.136.164
                                        Jan 15, 2025 03:05:12.106091022 CET4454998812.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:12.106156111 CET49988445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:12.106215954 CET49988445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:12.106518030 CET49989445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:12.111072063 CET4454998812.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:12.111109018 CET49988445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:12.111325979 CET4454998912.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:12.111387014 CET49989445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:12.116489887 CET49989445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:12.121289968 CET4454998912.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:13.360487938 CET44549740183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:13.360574961 CET49740445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:13.360656977 CET49740445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:13.360729933 CET49740445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:13.365398884 CET44549740183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:13.365535975 CET44549740183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:14.110383987 CET50008445192.168.2.4122.116.214.234
                                        Jan 15, 2025 03:05:14.115187883 CET44550008122.116.214.234192.168.2.4
                                        Jan 15, 2025 03:05:14.115299940 CET50008445192.168.2.4122.116.214.234
                                        Jan 15, 2025 03:05:14.115441084 CET50008445192.168.2.4122.116.214.234
                                        Jan 15, 2025 03:05:14.115689993 CET50009445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:14.120661020 CET44550009122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:14.120781898 CET50009445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:14.120809078 CET44550008122.116.214.234192.168.2.4
                                        Jan 15, 2025 03:05:14.120873928 CET50009445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:14.120872974 CET50008445192.168.2.4122.116.214.234
                                        Jan 15, 2025 03:05:14.121118069 CET50010445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:14.126092911 CET44550009122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:14.126152039 CET50009445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:14.126498938 CET44550010122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:14.126557112 CET50010445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:14.126576900 CET50010445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:14.131345987 CET44550010122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:15.326872110 CET44549766207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:15.327126026 CET49766445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:15.327126026 CET49766445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:15.327171087 CET49766445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:15.331952095 CET44549766207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:15.331963062 CET44549766207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:16.125658035 CET50031445192.168.2.4159.10.241.30
                                        Jan 15, 2025 03:05:16.130486012 CET44550031159.10.241.30192.168.2.4
                                        Jan 15, 2025 03:05:16.130611897 CET50031445192.168.2.4159.10.241.30
                                        Jan 15, 2025 03:05:16.130650997 CET50031445192.168.2.4159.10.241.30
                                        Jan 15, 2025 03:05:16.130989075 CET50032445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:16.135606050 CET44550031159.10.241.30192.168.2.4
                                        Jan 15, 2025 03:05:16.135664940 CET50031445192.168.2.4159.10.241.30
                                        Jan 15, 2025 03:05:16.135930061 CET44550032159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:16.136009932 CET50032445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:16.136009932 CET50032445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:16.136303902 CET50033445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:16.140980959 CET44550032159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:16.141041040 CET50032445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:16.141130924 CET44550033159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:16.141191959 CET50033445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:16.141222000 CET50033445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:16.145975113 CET44550033159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:16.375727892 CET50038445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:16.380561113 CET44550038183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:16.380665064 CET50038445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:16.380753040 CET50038445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:16.385593891 CET44550038183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:17.323163986 CET4454979343.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:17.323328972 CET49793445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:17.323472977 CET49793445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:17.323472977 CET49793445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:17.328279018 CET4454979343.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:17.328289032 CET4454979343.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:18.141184092 CET50040445192.168.2.4148.155.59.221
                                        Jan 15, 2025 03:05:18.146157026 CET44550040148.155.59.221192.168.2.4
                                        Jan 15, 2025 03:05:18.146241903 CET50040445192.168.2.4148.155.59.221
                                        Jan 15, 2025 03:05:18.146265984 CET50040445192.168.2.4148.155.59.221
                                        Jan 15, 2025 03:05:18.146373987 CET50041445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:18.151201010 CET44550041148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:18.151258945 CET50041445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:18.151278019 CET50041445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:18.151304007 CET44550040148.155.59.221192.168.2.4
                                        Jan 15, 2025 03:05:18.151352882 CET50040445192.168.2.4148.155.59.221
                                        Jan 15, 2025 03:05:18.151585102 CET50042445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:18.156266928 CET44550041148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:18.156331062 CET50041445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:18.156460047 CET44550042148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:18.156521082 CET50042445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:18.156558037 CET50042445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:18.161379099 CET44550042148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:18.328696012 CET50043445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:18.333548069 CET44550043207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:18.333647966 CET50043445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:18.333735943 CET50043445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:18.338536978 CET44550043207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:19.418299913 CET4454981686.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:19.418431044 CET49816445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:19.418587923 CET49816445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:19.418658972 CET49816445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:19.423727989 CET4454981686.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:19.424230099 CET4454981686.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:20.157040119 CET50044445192.168.2.4202.72.145.95
                                        Jan 15, 2025 03:05:20.162033081 CET44550044202.72.145.95192.168.2.4
                                        Jan 15, 2025 03:05:20.162159920 CET50044445192.168.2.4202.72.145.95
                                        Jan 15, 2025 03:05:20.162203074 CET50044445192.168.2.4202.72.145.95
                                        Jan 15, 2025 03:05:20.162420034 CET50045445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:20.168437004 CET44550045202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:20.168584108 CET50045445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:20.168607950 CET50045445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:20.168622017 CET44550044202.72.145.95192.168.2.4
                                        Jan 15, 2025 03:05:20.168684959 CET50044445192.168.2.4202.72.145.95
                                        Jan 15, 2025 03:05:20.169070959 CET50046445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:20.175008059 CET44550045202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:20.175081015 CET50045445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:20.176147938 CET44550046202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:20.176234007 CET50046445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:20.176337004 CET50046445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:20.183058977 CET44550046202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:20.328622103 CET50047445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:20.333796978 CET4455004743.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:20.333880901 CET50047445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:20.333951950 CET50047445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:20.338781118 CET4455004743.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:21.417849064 CET44549841221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:21.418035030 CET49841445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:21.418126106 CET49841445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:21.418201923 CET49841445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:21.422943115 CET44549841221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:21.423118114 CET44549841221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:22.172329903 CET50048445192.168.2.4182.88.71.181
                                        Jan 15, 2025 03:05:22.177160978 CET44550048182.88.71.181192.168.2.4
                                        Jan 15, 2025 03:05:22.177234888 CET50048445192.168.2.4182.88.71.181
                                        Jan 15, 2025 03:05:22.177277088 CET50048445192.168.2.4182.88.71.181
                                        Jan 15, 2025 03:05:22.177417994 CET50049445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:22.182143927 CET44550048182.88.71.181192.168.2.4
                                        Jan 15, 2025 03:05:22.182188988 CET44550049182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:22.182195902 CET50048445192.168.2.4182.88.71.181
                                        Jan 15, 2025 03:05:22.182245970 CET50049445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:22.182300091 CET50049445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:22.182548046 CET50050445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:22.187199116 CET44550049182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:22.187237978 CET50049445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:22.187380075 CET44550050182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:22.187428951 CET50050445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:22.187463045 CET50050445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:22.192234993 CET44550050182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:22.422472000 CET50051445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:22.427337885 CET4455005186.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:22.427429914 CET50051445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:22.427521944 CET50051445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:22.432477951 CET4455005186.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:23.386162996 CET4454986645.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:23.386353016 CET49866445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:23.388283014 CET49866445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:23.388350010 CET49866445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:23.393625975 CET4454986645.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:23.393964052 CET4454986645.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:24.188280106 CET50052445192.168.2.48.6.76.80
                                        Jan 15, 2025 03:05:24.193258047 CET445500528.6.76.80192.168.2.4
                                        Jan 15, 2025 03:05:24.193315983 CET50052445192.168.2.48.6.76.80
                                        Jan 15, 2025 03:05:24.193339109 CET50052445192.168.2.48.6.76.80
                                        Jan 15, 2025 03:05:24.193471909 CET50053445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:24.198307037 CET445500528.6.76.80192.168.2.4
                                        Jan 15, 2025 03:05:24.198318958 CET445500538.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:24.198374033 CET50052445192.168.2.48.6.76.80
                                        Jan 15, 2025 03:05:24.198407888 CET50053445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:24.198479891 CET50053445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:24.198827982 CET50054445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:24.203442097 CET445500538.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:24.203485012 CET50053445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:24.203614950 CET445500548.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:24.203660011 CET50054445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:24.203691006 CET50054445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:24.208466053 CET445500548.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:24.422945023 CET50055445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:24.427738905 CET44550055221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:24.427807093 CET50055445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:24.430119991 CET50055445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:24.434912920 CET44550055221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:25.417581081 CET44549890155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:25.417932034 CET49890445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:25.417932034 CET49890445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:25.417932034 CET49890445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:25.422837019 CET44549890155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:25.422847986 CET44549890155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:26.206610918 CET50056445192.168.2.4202.14.161.67
                                        Jan 15, 2025 03:05:26.211534977 CET44550056202.14.161.67192.168.2.4
                                        Jan 15, 2025 03:05:26.211627007 CET50056445192.168.2.4202.14.161.67
                                        Jan 15, 2025 03:05:26.242398024 CET50056445192.168.2.4202.14.161.67
                                        Jan 15, 2025 03:05:26.242652893 CET50057445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:26.247225046 CET44550056202.14.161.67192.168.2.4
                                        Jan 15, 2025 03:05:26.247318983 CET50056445192.168.2.4202.14.161.67
                                        Jan 15, 2025 03:05:26.247651100 CET44550057202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:26.247725964 CET50057445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:26.248719931 CET50057445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:26.249114990 CET50058445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:26.253499031 CET44550057202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:26.253575087 CET50057445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:26.253878117 CET44550058202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:26.253943920 CET50058445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:26.263511896 CET50058445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:26.268302917 CET44550058202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:26.392508030 CET50059445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:26.399645090 CET4455005945.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:26.399744987 CET50059445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:26.399816036 CET50059445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:26.406573057 CET4455005945.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:27.437100887 CET4454991535.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:27.437203884 CET49915445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:27.437295914 CET49915445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:27.437351942 CET49915445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:27.442131042 CET4454991535.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:27.442147017 CET4454991535.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:28.078924894 CET50060445192.168.2.448.68.228.108
                                        Jan 15, 2025 03:05:28.084548950 CET4455006048.68.228.108192.168.2.4
                                        Jan 15, 2025 03:05:28.084731102 CET50060445192.168.2.448.68.228.108
                                        Jan 15, 2025 03:05:28.084731102 CET50060445192.168.2.448.68.228.108
                                        Jan 15, 2025 03:05:28.084939003 CET50061445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:28.089759111 CET4455006148.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:28.089838028 CET50061445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:28.089871883 CET50061445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:28.090109110 CET50062445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:28.106374979 CET4455006048.68.228.108192.168.2.4
                                        Jan 15, 2025 03:05:28.106623888 CET50060445192.168.2.448.68.228.108
                                        Jan 15, 2025 03:05:28.106678963 CET4455006248.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:28.106750965 CET50062445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:28.106811047 CET50062445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:28.109850883 CET4455006148.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:28.109921932 CET50061445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:28.111516953 CET4455006248.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:28.422302008 CET50063445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:28.427104950 CET44550063155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:28.427248001 CET50063445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:28.427292109 CET50063445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:28.432043076 CET44550063155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:29.464417934 CET44549939199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:29.464684963 CET49939445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:29.464773893 CET49939445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:29.464831114 CET49939445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:29.469594002 CET44549939199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:29.469604969 CET44549939199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:29.828763962 CET50064445192.168.2.42.126.104.124
                                        Jan 15, 2025 03:05:29.833600998 CET445500642.126.104.124192.168.2.4
                                        Jan 15, 2025 03:05:29.833690882 CET50064445192.168.2.42.126.104.124
                                        Jan 15, 2025 03:05:29.833708048 CET50064445192.168.2.42.126.104.124
                                        Jan 15, 2025 03:05:29.833870888 CET50065445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:29.838880062 CET445500652.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:29.838947058 CET50065445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:29.838999987 CET445500642.126.104.124192.168.2.4
                                        Jan 15, 2025 03:05:29.839021921 CET50065445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:29.839042902 CET50064445192.168.2.42.126.104.124
                                        Jan 15, 2025 03:05:29.839323044 CET50066445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:29.843921900 CET445500652.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:29.843976021 CET50065445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:29.844218969 CET445500662.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:29.844281912 CET50066445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:29.844319105 CET50066445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:29.849144936 CET445500662.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:30.437823057 CET50067445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:30.442661047 CET4455006735.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:30.442751884 CET50067445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:30.442783117 CET50067445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:30.447660923 CET4455006735.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:31.469965935 CET50068445192.168.2.4191.37.254.57
                                        Jan 15, 2025 03:05:31.475425005 CET44550068191.37.254.57192.168.2.4
                                        Jan 15, 2025 03:05:31.475490093 CET50068445192.168.2.4191.37.254.57
                                        Jan 15, 2025 03:05:31.475573063 CET50068445192.168.2.4191.37.254.57
                                        Jan 15, 2025 03:05:31.475776911 CET50069445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:31.480405092 CET44550068191.37.254.57192.168.2.4
                                        Jan 15, 2025 03:05:31.480448008 CET50068445192.168.2.4191.37.254.57
                                        Jan 15, 2025 03:05:31.480601072 CET44550069191.37.254.1192.168.2.4
                                        Jan 15, 2025 03:05:31.480659962 CET50069445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:31.480850935 CET50069445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:31.481379032 CET50070445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:31.485692978 CET44550069191.37.254.1192.168.2.4
                                        Jan 15, 2025 03:05:31.485743999 CET50069445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:31.486135006 CET44550070191.37.254.1192.168.2.4
                                        Jan 15, 2025 03:05:31.486183882 CET50070445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:31.486223936 CET50070445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:31.491031885 CET44550070191.37.254.1192.168.2.4
                                        Jan 15, 2025 03:05:31.496793032 CET4454996478.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:31.496849060 CET49964445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:31.496889114 CET49964445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:31.497018099 CET49964445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:31.501590967 CET4454996478.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:31.501723051 CET4454996478.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:32.469276905 CET50071445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:32.474277973 CET44550071199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:32.474361897 CET50071445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:32.474405050 CET50071445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:32.479249954 CET44550071199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:33.000719070 CET50072445192.168.2.477.27.163.46
                                        Jan 15, 2025 03:05:33.005578041 CET4455007277.27.163.46192.168.2.4
                                        Jan 15, 2025 03:05:33.005700111 CET50072445192.168.2.477.27.163.46
                                        Jan 15, 2025 03:05:33.005731106 CET50072445192.168.2.477.27.163.46
                                        Jan 15, 2025 03:05:33.005948067 CET50073445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:33.010674000 CET4455007377.27.163.1192.168.2.4
                                        Jan 15, 2025 03:05:33.010745049 CET50073445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:33.010762930 CET50073445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:33.010783911 CET4455007277.27.163.46192.168.2.4
                                        Jan 15, 2025 03:05:33.010826111 CET50072445192.168.2.477.27.163.46
                                        Jan 15, 2025 03:05:33.011075020 CET50074445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:33.015904903 CET4455007477.27.163.1192.168.2.4
                                        Jan 15, 2025 03:05:33.015961885 CET50074445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:33.015985966 CET50074445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:33.016024113 CET4455007377.27.163.1192.168.2.4
                                        Jan 15, 2025 03:05:33.016062975 CET50073445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:33.020735025 CET4455007477.27.163.1192.168.2.4
                                        Jan 15, 2025 03:05:33.499669075 CET4454998912.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:33.499839067 CET49989445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:33.499839067 CET49989445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:33.499839067 CET49989445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:33.504664898 CET4454998912.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:33.504678011 CET4454998912.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:34.422920942 CET50075445192.168.2.438.133.158.54
                                        Jan 15, 2025 03:05:34.429343939 CET4455007538.133.158.54192.168.2.4
                                        Jan 15, 2025 03:05:34.429461956 CET50075445192.168.2.438.133.158.54
                                        Jan 15, 2025 03:05:34.431149006 CET50075445192.168.2.438.133.158.54
                                        Jan 15, 2025 03:05:34.431391001 CET50076445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:34.437582016 CET4455007638.133.158.1192.168.2.4
                                        Jan 15, 2025 03:05:34.437606096 CET4455007538.133.158.54192.168.2.4
                                        Jan 15, 2025 03:05:34.437668085 CET50076445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:34.437684059 CET50075445192.168.2.438.133.158.54
                                        Jan 15, 2025 03:05:34.437836885 CET50076445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:34.438216925 CET50077445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:34.443036079 CET4455007738.133.158.1192.168.2.4
                                        Jan 15, 2025 03:05:34.443092108 CET50077445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:34.443123102 CET50077445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:34.443172932 CET4455007638.133.158.1192.168.2.4
                                        Jan 15, 2025 03:05:34.443242073 CET50076445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:34.448131084 CET4455007738.133.158.1192.168.2.4
                                        Jan 15, 2025 03:05:34.500340939 CET50078445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:34.506623983 CET4455007878.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:34.506736040 CET50078445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:34.506772041 CET50078445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:34.513712883 CET4455007878.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:35.517131090 CET44550010122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:35.517191887 CET50010445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:35.517225981 CET50010445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:35.517267942 CET50010445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:35.522123098 CET44550010122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:35.522135019 CET44550010122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:35.750935078 CET50080445192.168.2.4163.159.85.24
                                        Jan 15, 2025 03:05:35.757911921 CET44550080163.159.85.24192.168.2.4
                                        Jan 15, 2025 03:05:35.757982969 CET50080445192.168.2.4163.159.85.24
                                        Jan 15, 2025 03:05:35.758049965 CET50080445192.168.2.4163.159.85.24
                                        Jan 15, 2025 03:05:35.758210897 CET50081445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:35.764661074 CET44550081163.159.85.1192.168.2.4
                                        Jan 15, 2025 03:05:35.764733076 CET50081445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:35.764759064 CET44550080163.159.85.24192.168.2.4
                                        Jan 15, 2025 03:05:35.764811039 CET50080445192.168.2.4163.159.85.24
                                        Jan 15, 2025 03:05:35.764816046 CET50081445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:35.765127897 CET50082445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:35.771857023 CET44550081163.159.85.1192.168.2.4
                                        Jan 15, 2025 03:05:35.771939993 CET50081445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:35.772249937 CET44550082163.159.85.1192.168.2.4
                                        Jan 15, 2025 03:05:35.772316933 CET50082445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:35.772358894 CET50082445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:35.778664112 CET44550082163.159.85.1192.168.2.4
                                        Jan 15, 2025 03:05:36.501132965 CET50088445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:36.505983114 CET4455008812.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:36.506045103 CET50088445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:36.508433104 CET50088445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:36.513360977 CET4455008812.102.136.1192.168.2.4
                                        Jan 15, 2025 03:05:37.000562906 CET50089445192.168.2.4180.199.173.218
                                        Jan 15, 2025 03:05:37.005507946 CET44550089180.199.173.218192.168.2.4
                                        Jan 15, 2025 03:05:37.005587101 CET50089445192.168.2.4180.199.173.218
                                        Jan 15, 2025 03:05:37.005696058 CET50089445192.168.2.4180.199.173.218
                                        Jan 15, 2025 03:05:37.005844116 CET50090445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:37.010581017 CET44550089180.199.173.218192.168.2.4
                                        Jan 15, 2025 03:05:37.010592937 CET44550090180.199.173.1192.168.2.4
                                        Jan 15, 2025 03:05:37.010632038 CET50089445192.168.2.4180.199.173.218
                                        Jan 15, 2025 03:05:37.010668993 CET50090445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:37.010756016 CET50090445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:37.010996103 CET50091445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:37.015650034 CET44550090180.199.173.1192.168.2.4
                                        Jan 15, 2025 03:05:37.015712023 CET50090445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:37.015870094 CET44550091180.199.173.1192.168.2.4
                                        Jan 15, 2025 03:05:37.015928030 CET50091445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:37.015954018 CET50091445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:37.020678043 CET44550091180.199.173.1192.168.2.4
                                        Jan 15, 2025 03:05:37.495872021 CET44550033159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:37.495966911 CET50033445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:37.496006966 CET50033445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:37.496053934 CET50033445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:37.502703905 CET44550033159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:37.503765106 CET44550033159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:37.747545958 CET44550038183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:37.747689962 CET50038445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:37.747730017 CET50038445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:37.747792959 CET50038445192.168.2.4183.50.126.1
                                        Jan 15, 2025 03:05:37.752476931 CET44550038183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:37.752670050 CET44550038183.50.126.1192.168.2.4
                                        Jan 15, 2025 03:05:37.812892914 CET50098445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:37.819595098 CET44550098183.50.126.2192.168.2.4
                                        Jan 15, 2025 03:05:37.819669008 CET50098445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:37.819708109 CET50098445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:37.819998980 CET50099445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:37.826314926 CET44550098183.50.126.2192.168.2.4
                                        Jan 15, 2025 03:05:37.826368093 CET50098445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:37.826556921 CET44550099183.50.126.2192.168.2.4
                                        Jan 15, 2025 03:05:37.826611996 CET50099445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:37.826651096 CET50099445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:37.833642960 CET44550099183.50.126.2192.168.2.4
                                        Jan 15, 2025 03:05:38.165278912 CET50105445192.168.2.4151.171.58.30
                                        Jan 15, 2025 03:05:38.170344114 CET44550105151.171.58.30192.168.2.4
                                        Jan 15, 2025 03:05:38.171255112 CET50105445192.168.2.4151.171.58.30
                                        Jan 15, 2025 03:05:38.171334982 CET50105445192.168.2.4151.171.58.30
                                        Jan 15, 2025 03:05:38.171506882 CET50106445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:38.176599979 CET44550106151.171.58.1192.168.2.4
                                        Jan 15, 2025 03:05:38.176791906 CET44550105151.171.58.30192.168.2.4
                                        Jan 15, 2025 03:05:38.176881075 CET50105445192.168.2.4151.171.58.30
                                        Jan 15, 2025 03:05:38.176892042 CET50106445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:38.176986933 CET50106445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:38.177309036 CET50107445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:38.181829929 CET44550106151.171.58.1192.168.2.4
                                        Jan 15, 2025 03:05:38.182086945 CET44550107151.171.58.1192.168.2.4
                                        Jan 15, 2025 03:05:38.182151079 CET50106445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:38.182182074 CET50107445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:38.182229996 CET50107445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:38.186949968 CET44550107151.171.58.1192.168.2.4
                                        Jan 15, 2025 03:05:38.531610966 CET50108445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:38.536477089 CET44550108122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:38.536551952 CET50108445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:38.536591053 CET50108445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:38.541343927 CET44550108122.116.214.1192.168.2.4
                                        Jan 15, 2025 03:05:39.248245955 CET50114445192.168.2.4151.131.117.202
                                        Jan 15, 2025 03:05:39.253050089 CET44550114151.131.117.202192.168.2.4
                                        Jan 15, 2025 03:05:39.253114939 CET50114445192.168.2.4151.131.117.202
                                        Jan 15, 2025 03:05:39.253261089 CET50114445192.168.2.4151.131.117.202
                                        Jan 15, 2025 03:05:39.253417015 CET50115445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:39.258107901 CET44550114151.131.117.202192.168.2.4
                                        Jan 15, 2025 03:05:39.258163929 CET50114445192.168.2.4151.131.117.202
                                        Jan 15, 2025 03:05:39.258188963 CET44550115151.131.117.1192.168.2.4
                                        Jan 15, 2025 03:05:39.258249044 CET50115445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:39.258295059 CET50115445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:39.262170076 CET50116445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:39.263176918 CET44550115151.131.117.1192.168.2.4
                                        Jan 15, 2025 03:05:39.263223886 CET50115445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:39.266936064 CET44550116151.131.117.1192.168.2.4
                                        Jan 15, 2025 03:05:39.267239094 CET50116445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:39.269342899 CET50116445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:39.274207115 CET44550116151.131.117.1192.168.2.4
                                        Jan 15, 2025 03:05:39.546622038 CET44550042148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:39.546681881 CET50042445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:39.546720982 CET50042445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:39.546752930 CET50042445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:39.551598072 CET44550042148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:39.551608086 CET44550042148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:39.699115992 CET44550043207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:39.699228048 CET50043445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:39.699274063 CET50043445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:39.699342966 CET50043445192.168.2.4207.109.181.1
                                        Jan 15, 2025 03:05:39.704154968 CET44550043207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:39.704165936 CET44550043207.109.181.1192.168.2.4
                                        Jan 15, 2025 03:05:39.750478029 CET50122445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:39.757555008 CET44550122207.109.181.2192.168.2.4
                                        Jan 15, 2025 03:05:39.757622957 CET50122445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:39.757703066 CET50122445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:39.758120060 CET50123445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:39.762655973 CET44550122207.109.181.2192.168.2.4
                                        Jan 15, 2025 03:05:39.762708902 CET50122445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:39.763077974 CET44550123207.109.181.2192.168.2.4
                                        Jan 15, 2025 03:05:39.763161898 CET50123445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:39.763161898 CET50123445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:39.767940044 CET44550123207.109.181.2192.168.2.4
                                        Jan 15, 2025 03:05:40.266426086 CET50124445192.168.2.457.176.241.137
                                        Jan 15, 2025 03:05:40.271384954 CET4455012457.176.241.137192.168.2.4
                                        Jan 15, 2025 03:05:40.273539066 CET50124445192.168.2.457.176.241.137
                                        Jan 15, 2025 03:05:40.273617983 CET50124445192.168.2.457.176.241.137
                                        Jan 15, 2025 03:05:40.273775101 CET50125445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:40.278570890 CET4455012457.176.241.137192.168.2.4
                                        Jan 15, 2025 03:05:40.278584957 CET4455012557.176.241.1192.168.2.4
                                        Jan 15, 2025 03:05:40.278718948 CET50124445192.168.2.457.176.241.137
                                        Jan 15, 2025 03:05:40.278767109 CET50125445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:40.278888941 CET50125445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:40.279396057 CET50126445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:40.283727884 CET4455012557.176.241.1192.168.2.4
                                        Jan 15, 2025 03:05:40.283793926 CET50125445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:40.284210920 CET4455012657.176.241.1192.168.2.4
                                        Jan 15, 2025 03:05:40.284272909 CET50126445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:40.284419060 CET50126445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:40.289194107 CET4455012657.176.241.1192.168.2.4
                                        Jan 15, 2025 03:05:40.500399113 CET50132445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:40.505321980 CET44550132159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:40.507258892 CET50132445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:40.507309914 CET50132445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:40.512243032 CET44550132159.10.241.1192.168.2.4
                                        Jan 15, 2025 03:05:41.203866005 CET50138445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.208709002 CET4455013839.122.246.1192.168.2.4
                                        Jan 15, 2025 03:05:41.208822966 CET50138445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.208873034 CET50138445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.209099054 CET50139445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.216602087 CET4455013839.122.246.1192.168.2.4
                                        Jan 15, 2025 03:05:41.216618061 CET4455013939.122.246.1192.168.2.4
                                        Jan 15, 2025 03:05:41.216682911 CET50138445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.216716051 CET50139445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.216864109 CET50139445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.217267036 CET50140445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.222095013 CET4455013939.122.246.1192.168.2.4
                                        Jan 15, 2025 03:05:41.222243071 CET4455014039.122.246.1192.168.2.4
                                        Jan 15, 2025 03:05:41.222295046 CET50139445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.222331047 CET50140445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.222374916 CET50140445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:41.228189945 CET4455014039.122.246.1192.168.2.4
                                        Jan 15, 2025 03:05:41.529002905 CET44550046202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:41.529081106 CET50046445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:41.529156923 CET50046445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:41.529156923 CET50046445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:41.534459114 CET44550046202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:41.534477949 CET44550046202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:41.700998068 CET4455004743.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:41.701298952 CET50047445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:41.701299906 CET50047445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:41.701400042 CET50047445192.168.2.443.87.172.1
                                        Jan 15, 2025 03:05:41.709665060 CET4455004743.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:41.709693909 CET4455004743.87.172.1192.168.2.4
                                        Jan 15, 2025 03:05:41.767702103 CET50141445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:41.775249958 CET4455014143.87.172.2192.168.2.4
                                        Jan 15, 2025 03:05:41.779261112 CET50141445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:41.779294968 CET50141445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:41.779898882 CET50142445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:41.787441969 CET4455014243.87.172.2192.168.2.4
                                        Jan 15, 2025 03:05:41.787467003 CET4455014143.87.172.2192.168.2.4
                                        Jan 15, 2025 03:05:41.787554026 CET50141445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:41.787633896 CET50142445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:41.787633896 CET50142445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:41.796937943 CET4455014243.87.172.2192.168.2.4
                                        Jan 15, 2025 03:05:42.078814030 CET50148445192.168.2.4201.38.141.37
                                        Jan 15, 2025 03:05:42.547455072 CET50149445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:42.907108068 CET50150445192.168.2.4200.221.205.31
                                        Jan 15, 2025 03:05:43.093920946 CET50148445192.168.2.4201.38.141.37
                                        Jan 15, 2025 03:05:43.203654051 CET50151445192.168.2.4110.169.215.145
                                        Jan 15, 2025 03:05:43.265711069 CET44550148201.38.141.37192.168.2.4
                                        Jan 15, 2025 03:05:43.265733957 CET44550149148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:43.265758038 CET44550150200.221.205.31192.168.2.4
                                        Jan 15, 2025 03:05:43.265762091 CET44550148201.38.141.37192.168.2.4
                                        Jan 15, 2025 03:05:43.265765905 CET44550151110.169.215.145192.168.2.4
                                        Jan 15, 2025 03:05:43.265783072 CET50148445192.168.2.4201.38.141.37
                                        Jan 15, 2025 03:05:43.265841961 CET50149445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:43.265861988 CET50148445192.168.2.4201.38.141.37
                                        Jan 15, 2025 03:05:43.265866041 CET50150445192.168.2.4200.221.205.31
                                        Jan 15, 2025 03:05:43.265930891 CET50151445192.168.2.4110.169.215.145
                                        Jan 15, 2025 03:05:43.265930891 CET50149445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:43.266009092 CET50150445192.168.2.4200.221.205.31
                                        Jan 15, 2025 03:05:43.266016006 CET50151445192.168.2.4110.169.215.145
                                        Jan 15, 2025 03:05:43.266196012 CET50152445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:43.266242981 CET50153445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:43.273823977 CET44550149148.155.59.1192.168.2.4
                                        Jan 15, 2025 03:05:43.273833036 CET44550152200.221.205.1192.168.2.4
                                        Jan 15, 2025 03:05:43.273840904 CET44550153110.169.215.1192.168.2.4
                                        Jan 15, 2025 03:05:43.273885965 CET50152445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:43.273910046 CET50153445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:43.273962975 CET50153445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:43.273962975 CET50152445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:43.274235964 CET50154445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:43.274292946 CET50155445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:43.275933027 CET44550150200.221.205.31192.168.2.4
                                        Jan 15, 2025 03:05:43.276002884 CET50150445192.168.2.4200.221.205.31
                                        Jan 15, 2025 03:05:43.276321888 CET44550151110.169.215.145192.168.2.4
                                        Jan 15, 2025 03:05:43.276380062 CET50151445192.168.2.4110.169.215.145
                                        Jan 15, 2025 03:05:43.281961918 CET44550153110.169.215.1192.168.2.4
                                        Jan 15, 2025 03:05:43.281972885 CET44550154200.221.205.1192.168.2.4
                                        Jan 15, 2025 03:05:43.282008886 CET50153445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:43.282008886 CET44550155110.169.215.1192.168.2.4
                                        Jan 15, 2025 03:05:43.282022953 CET44550152200.221.205.1192.168.2.4
                                        Jan 15, 2025 03:05:43.282031059 CET50154445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:43.282051086 CET50155445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:43.282078981 CET50154445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:43.282078981 CET50152445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:43.282126904 CET50155445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:43.290606976 CET44550154200.221.205.1192.168.2.4
                                        Jan 15, 2025 03:05:43.290622950 CET44550155110.169.215.1192.168.2.4
                                        Jan 15, 2025 03:05:43.545990944 CET44550050182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:43.546108007 CET50050445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:43.546164989 CET50050445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:43.546225071 CET50050445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:43.552048922 CET44550050182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:43.552066088 CET44550050182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:43.672817945 CET50161445192.168.2.4134.127.38.237
                                        Jan 15, 2025 03:05:43.679018974 CET44550161134.127.38.237192.168.2.4
                                        Jan 15, 2025 03:05:43.679124117 CET50161445192.168.2.4134.127.38.237
                                        Jan 15, 2025 03:05:43.679205894 CET50161445192.168.2.4134.127.38.237
                                        Jan 15, 2025 03:05:43.679508924 CET50162445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:43.684577942 CET44550161134.127.38.237192.168.2.4
                                        Jan 15, 2025 03:05:43.685576916 CET44550161134.127.38.237192.168.2.4
                                        Jan 15, 2025 03:05:43.685610056 CET44550162134.127.38.1192.168.2.4
                                        Jan 15, 2025 03:05:43.685645103 CET50161445192.168.2.4134.127.38.237
                                        Jan 15, 2025 03:05:43.685694933 CET50162445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:43.685815096 CET50162445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:43.686237097 CET50163445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:43.692133904 CET44550162134.127.38.1192.168.2.4
                                        Jan 15, 2025 03:05:43.692167044 CET44550163134.127.38.1192.168.2.4
                                        Jan 15, 2025 03:05:43.692277908 CET50162445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:43.692295074 CET50163445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:43.692361116 CET50163445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:43.698803902 CET44550163134.127.38.1192.168.2.4
                                        Jan 15, 2025 03:05:43.824285030 CET4455005186.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:43.824429989 CET50051445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:43.824500084 CET50051445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:43.824609041 CET50051445192.168.2.486.128.111.1
                                        Jan 15, 2025 03:05:43.832194090 CET4455005186.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:43.832226992 CET4455005186.128.111.1192.168.2.4
                                        Jan 15, 2025 03:05:43.891141891 CET50164445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:44.018034935 CET4455016486.128.111.2192.168.2.4
                                        Jan 15, 2025 03:05:44.018305063 CET50164445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:44.018306017 CET50164445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:44.018656969 CET50165445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:44.023464918 CET4455016486.128.111.2192.168.2.4
                                        Jan 15, 2025 03:05:44.023524046 CET4455016586.128.111.2192.168.2.4
                                        Jan 15, 2025 03:05:44.023540974 CET50164445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:44.023590088 CET50165445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:44.023631096 CET50165445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:44.028558016 CET4455016586.128.111.2192.168.2.4
                                        Jan 15, 2025 03:05:44.531575918 CET50172445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:44.537334919 CET44550172202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:44.537431002 CET50172445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:44.537461996 CET50172445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:44.543406010 CET44550172202.72.145.1192.168.2.4
                                        Jan 15, 2025 03:05:45.543015003 CET445500548.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:45.543131113 CET50054445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:45.543216944 CET50054445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:45.543283939 CET50054445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:45.548134089 CET445500548.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:45.548163891 CET445500548.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:45.812943935 CET44550055221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:45.813015938 CET50055445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:45.813101053 CET50055445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:45.813124895 CET50055445192.168.2.4221.48.37.1
                                        Jan 15, 2025 03:05:45.817956924 CET44550055221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:45.817991018 CET44550055221.48.37.1192.168.2.4
                                        Jan 15, 2025 03:05:45.875469923 CET50181445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:45.880314112 CET44550181221.48.37.2192.168.2.4
                                        Jan 15, 2025 03:05:45.880402088 CET50181445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:45.880444050 CET50181445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:45.880827904 CET50182445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:45.886372089 CET44550182221.48.37.2192.168.2.4
                                        Jan 15, 2025 03:05:45.886382103 CET44550181221.48.37.2192.168.2.4
                                        Jan 15, 2025 03:05:45.886440992 CET50181445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:45.886476040 CET50182445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:45.886533976 CET50182445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:45.891917944 CET44550182221.48.37.2192.168.2.4
                                        Jan 15, 2025 03:05:46.531560898 CET4972380192.168.2.42.22.50.131
                                        Jan 15, 2025 03:05:46.531729937 CET4972480192.168.2.42.22.50.131
                                        Jan 15, 2025 03:05:46.536593914 CET80497232.22.50.131192.168.2.4
                                        Jan 15, 2025 03:05:46.536659956 CET4972380192.168.2.42.22.50.131
                                        Jan 15, 2025 03:05:46.536906958 CET80497242.22.50.131192.168.2.4
                                        Jan 15, 2025 03:05:46.536967039 CET4972480192.168.2.42.22.50.131
                                        Jan 15, 2025 03:05:46.547183990 CET50190445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:46.552043915 CET44550190182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:46.552119970 CET50190445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:46.552139997 CET50190445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:46.556922913 CET44550190182.88.71.1192.168.2.4
                                        Jan 15, 2025 03:05:47.622880936 CET44550058202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:47.622953892 CET50058445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:47.623028994 CET50058445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:47.623029947 CET50058445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:47.628002882 CET44550058202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:47.628032923 CET44550058202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:47.761779070 CET4455005945.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:47.765882969 CET50059445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:47.766067028 CET50059445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:47.766206980 CET50059445192.168.2.445.97.165.1
                                        Jan 15, 2025 03:05:47.772392988 CET4455005945.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:47.773509979 CET4455005945.97.165.1192.168.2.4
                                        Jan 15, 2025 03:05:47.828742027 CET50209445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:47.835611105 CET4455020945.97.165.2192.168.2.4
                                        Jan 15, 2025 03:05:47.837404013 CET50209445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:47.837462902 CET50209445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:47.837743044 CET50210445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:47.845280886 CET4455021045.97.165.2192.168.2.4
                                        Jan 15, 2025 03:05:47.845313072 CET4455020945.97.165.2192.168.2.4
                                        Jan 15, 2025 03:05:47.845391035 CET50209445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:47.845482111 CET50210445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:47.845482111 CET50210445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:47.852413893 CET4455021045.97.165.2192.168.2.4
                                        Jan 15, 2025 03:05:48.547329903 CET50222445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:48.552478075 CET445502228.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:48.555289030 CET50222445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:48.559220076 CET50222445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:48.564058065 CET445502228.6.76.1192.168.2.4
                                        Jan 15, 2025 03:05:49.497889042 CET4455006248.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:49.498030901 CET50062445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:49.498188019 CET50062445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:49.498244047 CET50062445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:49.503014088 CET4455006248.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:49.503026962 CET4455006248.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:49.810578108 CET44550063155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:49.810693026 CET50063445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:49.810722113 CET50063445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:49.810766935 CET50063445192.168.2.4155.195.218.1
                                        Jan 15, 2025 03:05:49.815526962 CET44550063155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:49.815541983 CET44550063155.195.218.1192.168.2.4
                                        Jan 15, 2025 03:05:49.875587940 CET50242445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:49.881980896 CET44550242155.195.218.2192.168.2.4
                                        Jan 15, 2025 03:05:49.883285046 CET50242445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:49.883341074 CET50242445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:49.883716106 CET50243445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:49.888339996 CET44550242155.195.218.2192.168.2.4
                                        Jan 15, 2025 03:05:49.888648033 CET44550243155.195.218.2192.168.2.4
                                        Jan 15, 2025 03:05:49.888730049 CET50242445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:49.888912916 CET50243445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:49.888914108 CET50243445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:49.893809080 CET44550243155.195.218.2192.168.2.4
                                        Jan 15, 2025 03:05:50.625642061 CET50258445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:50.631865025 CET44550258202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:50.631959915 CET50258445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:50.631998062 CET50258445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:50.636734962 CET44550258202.14.161.1192.168.2.4
                                        Jan 15, 2025 03:05:51.199385881 CET445500662.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:51.199671030 CET50066445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:51.207972050 CET50066445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:51.208013058 CET50066445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:51.212819099 CET445500662.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:51.212830067 CET445500662.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:51.844136000 CET4455006735.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:51.844203949 CET50067445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:51.844230890 CET50067445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:51.844259024 CET50067445192.168.2.435.65.202.1
                                        Jan 15, 2025 03:05:51.849020958 CET4455006735.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:51.849033117 CET4455006735.65.202.1192.168.2.4
                                        Jan 15, 2025 03:05:51.906848907 CET50292445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:51.911768913 CET4455029235.65.202.2192.168.2.4
                                        Jan 15, 2025 03:05:51.911865950 CET50292445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:51.911955118 CET50292445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:51.912280083 CET50293445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:51.916901112 CET4455029235.65.202.2192.168.2.4
                                        Jan 15, 2025 03:05:51.917032003 CET50292445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:51.917121887 CET4455029335.65.202.2192.168.2.4
                                        Jan 15, 2025 03:05:51.917186975 CET50293445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:51.917201042 CET50293445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:51.922041893 CET4455029335.65.202.2192.168.2.4
                                        Jan 15, 2025 03:05:52.500466108 CET50312445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:52.507268906 CET4455031248.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:52.507428885 CET50312445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:52.507428885 CET50312445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:52.512326956 CET4455031248.68.228.1192.168.2.4
                                        Jan 15, 2025 03:05:52.840169907 CET44550070191.37.254.1192.168.2.4
                                        Jan 15, 2025 03:05:52.840601921 CET50070445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:52.840601921 CET50070445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:52.840601921 CET50070445192.168.2.4191.37.254.1
                                        Jan 15, 2025 03:05:52.845537901 CET44550070191.37.254.1192.168.2.4
                                        Jan 15, 2025 03:05:52.845566988 CET44550070191.37.254.1192.168.2.4
                                        Jan 15, 2025 03:05:53.859946966 CET44550071199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:53.860039949 CET50071445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:53.863574028 CET50071445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:53.863629103 CET50071445192.168.2.4199.24.168.1
                                        Jan 15, 2025 03:05:53.868495941 CET44550071199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:53.868527889 CET44550071199.24.168.1192.168.2.4
                                        Jan 15, 2025 03:05:53.937927961 CET50365445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:05:53.943039894 CET44550365199.24.168.2192.168.2.4
                                        Jan 15, 2025 03:05:53.943181992 CET50365445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:05:53.946069956 CET50365445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:05:53.950169086 CET50367445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:05:53.950932026 CET44550365199.24.168.2192.168.2.4
                                        Jan 15, 2025 03:05:53.951004982 CET50365445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:05:53.955041885 CET44550367199.24.168.2192.168.2.4
                                        Jan 15, 2025 03:05:53.955143929 CET50367445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:05:53.955143929 CET50367445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:05:53.959981918 CET44550367199.24.168.2192.168.2.4
                                        Jan 15, 2025 03:05:54.219223976 CET50379445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:54.224381924 CET445503792.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:54.224494934 CET50379445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:54.224494934 CET50379445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:54.229398966 CET445503792.126.104.1192.168.2.4
                                        Jan 15, 2025 03:05:54.371867895 CET4455007477.27.163.1192.168.2.4
                                        Jan 15, 2025 03:05:54.371939898 CET50074445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:54.371985912 CET50074445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:54.372023106 CET50074445192.168.2.477.27.163.1
                                        Jan 15, 2025 03:05:54.377670050 CET4455007477.27.163.1192.168.2.4
                                        Jan 15, 2025 03:05:54.377700090 CET4455007477.27.163.1192.168.2.4
                                        Jan 15, 2025 03:05:55.824487925 CET4455007738.133.158.1192.168.2.4
                                        Jan 15, 2025 03:05:55.824603081 CET50077445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:55.887278080 CET4455007878.189.127.1192.168.2.4
                                        Jan 15, 2025 03:05:55.887360096 CET50078445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:57.183801889 CET44550082163.159.85.1192.168.2.4
                                        Jan 15, 2025 03:05:57.183960915 CET50082445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:57.263021946 CET50142445192.168.2.443.87.172.2
                                        Jan 15, 2025 03:05:57.263048887 CET50165445192.168.2.486.128.111.2
                                        Jan 15, 2025 03:05:57.263062000 CET50077445192.168.2.438.133.158.1
                                        Jan 15, 2025 03:05:57.263065100 CET50078445192.168.2.478.189.127.1
                                        Jan 15, 2025 03:05:57.263103962 CET50126445192.168.2.457.176.241.1
                                        Jan 15, 2025 03:05:57.263122082 CET50182445192.168.2.4221.48.37.2
                                        Jan 15, 2025 03:05:57.263231993 CET50088445192.168.2.412.102.136.1
                                        Jan 15, 2025 03:05:57.263267040 CET50243445192.168.2.4155.195.218.2
                                        Jan 15, 2025 03:05:57.263309002 CET50132445192.168.2.4159.10.241.1
                                        Jan 15, 2025 03:05:57.263410091 CET50099445192.168.2.4183.50.126.2
                                        Jan 15, 2025 03:05:57.263423920 CET50082445192.168.2.4163.159.85.1
                                        Jan 15, 2025 03:05:57.263453007 CET50091445192.168.2.4180.199.173.1
                                        Jan 15, 2025 03:05:57.263467073 CET50107445192.168.2.4151.171.58.1
                                        Jan 15, 2025 03:05:57.263542891 CET50108445192.168.2.4122.116.214.1
                                        Jan 15, 2025 03:05:57.263550043 CET50116445192.168.2.4151.131.117.1
                                        Jan 15, 2025 03:05:57.263562918 CET50123445192.168.2.4207.109.181.2
                                        Jan 15, 2025 03:05:57.263582945 CET50140445192.168.2.439.122.246.1
                                        Jan 15, 2025 03:05:57.263592958 CET50149445192.168.2.4148.155.59.1
                                        Jan 15, 2025 03:05:57.263623953 CET50154445192.168.2.4200.221.205.1
                                        Jan 15, 2025 03:05:57.263669968 CET50155445192.168.2.4110.169.215.1
                                        Jan 15, 2025 03:05:57.263683081 CET50163445192.168.2.4134.127.38.1
                                        Jan 15, 2025 03:05:57.263683081 CET50190445192.168.2.4182.88.71.1
                                        Jan 15, 2025 03:05:57.263731003 CET50258445192.168.2.4202.14.161.1
                                        Jan 15, 2025 03:05:57.263747931 CET50210445192.168.2.445.97.165.2
                                        Jan 15, 2025 03:05:57.263752937 CET50172445192.168.2.4202.72.145.1
                                        Jan 15, 2025 03:05:57.263761997 CET50222445192.168.2.48.6.76.1
                                        Jan 15, 2025 03:05:57.263797998 CET50312445192.168.2.448.68.228.1
                                        Jan 15, 2025 03:05:57.263809919 CET50293445192.168.2.435.65.202.2
                                        Jan 15, 2025 03:05:57.263961077 CET50379445192.168.2.42.126.104.1
                                        Jan 15, 2025 03:05:57.263961077 CET50367445192.168.2.4199.24.168.2
                                        Jan 15, 2025 03:06:03.025840998 CET80497312.23.77.188192.168.2.4
                                        Jan 15, 2025 03:06:03.025996923 CET4973180192.168.2.42.23.77.188
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 15, 2025 03:04:47.643512964 CET5566853192.168.2.41.1.1.1
                                        Jan 15, 2025 03:04:47.953341961 CET53556681.1.1.1192.168.2.4
                                        Jan 15, 2025 03:04:48.590125084 CET6435453192.168.2.41.1.1.1
                                        Jan 15, 2025 03:04:48.771353006 CET53643541.1.1.1192.168.2.4
                                        Jan 15, 2025 03:04:58.075829983 CET138138192.168.2.4192.168.2.255
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 15, 2025 03:04:47.643512964 CET192.168.2.41.1.1.10x3fa9Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                        Jan 15, 2025 03:04:48.590125084 CET192.168.2.41.1.1.10xb1e2Standard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 15, 2025 03:04:47.953341961 CET1.1.1.1192.168.2.40x3fa9No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                        Jan 15, 2025 03:04:48.771353006 CET1.1.1.1192.168.2.40xb1e2No error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                        Jan 15, 2025 03:04:48.771353006 CET1.1.1.1192.168.2.40xb1e2No error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                        • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449732103.224.212.215807512C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 15, 2025 03:04:47.974740982 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Cache-Control: no-cache
                                        Jan 15, 2025 03:04:48.582285881 CET365INHTTP/1.1 302 Found
                                        date: Wed, 15 Jan 2025 02:04:48 GMT
                                        server: Apache
                                        set-cookie: __tad=1736906688.6242741; expires=Sat, 13-Jan-2035 02:04:48 GMT; Max-Age=315360000
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-48cb-ab27-b1d7f25d9429
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.449733199.59.243.228807512C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 15, 2025 03:04:48.777930021 CET169OUTGET /?subid1=20250115-1304-48cb-ab27-b1d7f25d9429 HTTP/1.1
                                        Cache-Control: no-cache
                                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Connection: Keep-Alive
                                        Jan 15, 2025 03:04:49.271224022 CET1236INHTTP/1.1 200 OK
                                        date: Wed, 15 Jan 2025 02:04:48 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: 84ae1b42-84fc-4740-a603-6b20200136a7
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jDDhJ9xj736ksG+xyDQVtqAPCCooYgDXxhrEa+66zB/htnvJ2TLFLl1JZ3VddWQa3GhejUg3taluTE1g23URfw==
                                        set-cookie: parking_session=84ae1b42-84fc-4740-a603-6b20200136a7; expires=Wed, 15 Jan 2025 02:19:49 GMT; path=/
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6a 44 44 68 4a 39 78 6a 37 33 36 6b 73 47 2b 78 79 44 51 56 74 71 41 50 43 43 6f 6f 59 67 44 58 78 68 72 45 61 2b 36 36 7a 42 2f 68 74 6e 76 4a 32 54 4c 46 4c 6c 31 4a 5a 33 56 64 64 57 51 61 33 47 68 65 6a 55 67 33 74 61 6c 75 54 45 31 67 32 33 55 52 66 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jDDhJ9xj736ksG+xyDQVtqAPCCooYgDXxhrEa+66zB/htnvJ2TLFLl1JZ3VddWQa3GhejUg3taluTE1g23URfw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                        Jan 15, 2025 03:04:49.271244049 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                        Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiODRhZTFiNDItODRmYy00NzQwLWE2MDMtNmIyMDIwMDEzNmE3IiwicGFnZV90aW1lIjoxNzM2OTA2Njg5LCJwYWdlX3VybCI6I


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.449734103.224.212.215807584C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 15, 2025 03:04:49.856250048 CET100OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Cache-Control: no-cache
                                        Jan 15, 2025 03:04:50.516004086 CET365INHTTP/1.1 302 Found
                                        date: Wed, 15 Jan 2025 02:04:50 GMT
                                        server: Apache
                                        set-cookie: __tad=1736906690.5743032; expires=Sat, 13-Jan-2035 02:04:50 GMT; Max-Age=315360000
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5082-90f7-a7068eb2f250
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.449735103.224.212.215807656C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 15, 2025 03:04:50.524604082 CET134OUTGET / HTTP/1.1
                                        Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Cache-Control: no-cache
                                        Cookie: __tad=1736906688.6242741
                                        Jan 15, 2025 03:04:51.859651089 CET269INHTTP/1.1 302 Found
                                        date: Wed, 15 Jan 2025 02:04:51 GMT
                                        server: Apache
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7f7
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:
                                        Jan 15, 2025 03:04:51.860321045 CET269INHTTP/1.1 302 Found
                                        date: Wed, 15 Jan 2025 02:04:51 GMT
                                        server: Apache
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7f7
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:
                                        Jan 15, 2025 03:04:51.860506058 CET269INHTTP/1.1 302 Found
                                        date: Wed, 15 Jan 2025 02:04:51 GMT
                                        server: Apache
                                        location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-1304-5151-bf6a-63383d41d7f7
                                        content-length: 2
                                        content-type: text/html; charset=UTF-8
                                        connection: close
                                        Data Raw: 0a 0a
                                        Data Ascii:


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.449736199.59.243.228807584C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 15, 2025 03:04:50.528528929 CET169OUTGET /?subid1=20250115-1304-5082-90f7-a7068eb2f250 HTTP/1.1
                                        Cache-Control: no-cache
                                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Connection: Keep-Alive
                                        Jan 15, 2025 03:04:51.859368086 CET1236INHTTP/1.1 200 OK
                                        date: Wed, 15 Jan 2025 02:04:50 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: 66aeb117-dc9f-422c-a833-853709825047
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_a1pAULAU8TMul3uo31nsJ/ZYRyBZJjEgqC+mco4sYfxTJEXILo8/xYmaqrYzPVFFubf39/VfN/8Q2bp3K4rknA==
                                        set-cookie: parking_session=66aeb117-dc9f-422c-a833-853709825047; expires=Wed, 15 Jan 2025 02:19:50 GMT; path=/
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 61 31 70 41 55 4c 41 55 38 54 4d 75 6c 33 75 6f 33 31 6e 73 4a 2f 5a 59 52 79 42 5a 4a 6a 45 67 71 43 2b 6d 63 6f 34 73 59 66 78 54 4a 45 58 49 4c 6f 38 2f 78 59 6d 61 71 72 59 7a 50 56 46 46 75 62 66 33 39 2f 56 66 4e 2f 38 51 32 62 70 33 4b 34 72 6b 6e 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_a1pAULAU8TMul3uo31nsJ/ZYRyBZJjEgqC+mco4sYfxTJEXILo8/xYmaqrYzPVFFubf39/VfN/8Q2bp3K4rknA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                        Jan 15, 2025 03:04:51.859385014 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                        Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNjZhZWIxMTctZGM5Zi00MjJjLWE4MzMtODUzNzA5ODI1MDQ3IiwicGFnZV90aW1lIjoxNzM2OTA2NjkwLCJwYWdlX3VybCI6I
                                        Jan 15, 2025 03:04:51.859461069 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                        Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNjZhZWIxMTctZGM5Zi00MjJjLWE4MzMtODUzNzA5ODI1MDQ3IiwicGFnZV90aW1lIjoxNzM2OTA2NjkwLCJwYWdlX3VybCI6I
                                        Jan 15, 2025 03:04:51.860030890 CET1236INHTTP/1.1 200 OK
                                        date: Wed, 15 Jan 2025 02:04:50 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: 66aeb117-dc9f-422c-a833-853709825047
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_a1pAULAU8TMul3uo31nsJ/ZYRyBZJjEgqC+mco4sYfxTJEXILo8/xYmaqrYzPVFFubf39/VfN/8Q2bp3K4rknA==
                                        set-cookie: parking_session=66aeb117-dc9f-422c-a833-853709825047; expires=Wed, 15 Jan 2025 02:19:50 GMT; path=/
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 61 31 70 41 55 4c 41 55 38 54 4d 75 6c 33 75 6f 33 31 6e 73 4a 2f 5a 59 52 79 42 5a 4a 6a 45 67 71 43 2b 6d 63 6f 34 73 59 66 78 54 4a 45 58 49 4c 6f 38 2f 78 59 6d 61 71 72 59 7a 50 56 46 46 75 62 66 33 39 2f 56 66 4e 2f 38 51 32 62 70 33 4b 34 72 6b 6e 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_a1pAULAU8TMul3uo31nsJ/ZYRyBZJjEgqC+mco4sYfxTJEXILo8/xYmaqrYzPVFFubf39/VfN/8Q2bp3K4rknA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                        Jan 15, 2025 03:04:51.860460997 CET1236INHTTP/1.1 200 OK
                                        date: Wed, 15 Jan 2025 02:04:50 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: 66aeb117-dc9f-422c-a833-853709825047
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_a1pAULAU8TMul3uo31nsJ/ZYRyBZJjEgqC+mco4sYfxTJEXILo8/xYmaqrYzPVFFubf39/VfN/8Q2bp3K4rknA==
                                        set-cookie: parking_session=66aeb117-dc9f-422c-a833-853709825047; expires=Wed, 15 Jan 2025 02:19:50 GMT; path=/
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 61 31 70 41 55 4c 41 55 38 54 4d 75 6c 33 75 6f 33 31 6e 73 4a 2f 5a 59 52 79 42 5a 4a 6a 45 67 71 43 2b 6d 63 6f 34 73 59 66 78 54 4a 45 58 49 4c 6f 38 2f 78 59 6d 61 71 72 59 7a 50 56 46 46 75 62 66 33 39 2f 56 66 4e 2f 38 51 32 62 70 33 4b 34 72 6b 6e 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_a1pAULAU8TMul3uo31nsJ/ZYRyBZJjEgqC+mco4sYfxTJEXILo8/xYmaqrYzPVFFubf39/VfN/8Q2bp3K4rknA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.449737199.59.243.228807656C:\Windows\mssecsvc.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 15, 2025 03:04:51.896326065 CET231OUTGET /?subid1=20250115-1304-5151-bf6a-63383d41d7f7 HTTP/1.1
                                        Cache-Control: no-cache
                                        Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        Connection: Keep-Alive
                                        Cookie: parking_session=84ae1b42-84fc-4740-a603-6b20200136a7
                                        Jan 15, 2025 03:04:52.354362965 CET1236INHTTP/1.1 200 OK
                                        date: Wed, 15 Jan 2025 02:04:52 GMT
                                        content-type: text/html; charset=utf-8
                                        content-length: 1262
                                        x-request-id: 6975b4e1-d156-4dfc-ac69-181d4568504c
                                        cache-control: no-store, max-age=0
                                        accept-ch: sec-ch-prefers-color-scheme
                                        critical-ch: sec-ch-prefers-color-scheme
                                        vary: sec-ch-prefers-color-scheme
                                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_TZ1mCN8WjKlq4GwTN3/82ZSzkd4B18qNaJbQjcu7327cwH1UYYbNi+LqslbC2hwpAsSUF3kINwrTHOreDEQ7Rw==
                                        set-cookie: parking_session=84ae1b42-84fc-4740-a603-6b20200136a7; expires=Wed, 15 Jan 2025 02:19:52 GMT
                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 54 5a 31 6d 43 4e 38 57 6a 4b 6c 71 34 47 77 54 4e 33 2f 38 32 5a 53 7a 6b 64 34 42 31 38 71 4e 61 4a 62 51 6a 63 75 37 33 32 37 63 77 48 31 55 59 59 62 4e 69 2b 4c 71 73 6c 62 43 32 68 77 70 41 73 53 55 46 33 6b 49 4e 77 72 54 48 4f 72 65 44 45 51 37 52 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                        Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_TZ1mCN8WjKlq4GwTN3/82ZSzkd4B18qNaJbQjcu7327cwH1UYYbNi+LqslbC2hwpAsSUF3kINwrTHOreDEQ7Rw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                        Jan 15, 2025 03:04:52.354386091 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                        Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiODRhZTFiNDItODRmYy00NzQwLWE2MDMtNmIyMDIwMDEzNmE3IiwicGFnZV90aW1lIjoxNzM2OTA2NjkyLCJwYWdlX3VybCI6Imh0dHA6L


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:21:04:46
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\loaddll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:loaddll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll"
                                        Imagebase:0xd00000
                                        File size:126'464 bytes
                                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:1
                                        Start time:21:04:46
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:21:04:46
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1
                                        Imagebase:0x240000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:21:04:46
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe C:\Users\user\Desktop\V01vdyUACe.dll,PlayGame
                                        Imagebase:0xed0000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:21:04:46
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",#1
                                        Imagebase:0xed0000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:21:04:46
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:9679BDFFCFC1DA1D852E8F218B335E78
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1779970986.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1780101745.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1780101745.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Target ID:6
                                        Start time:21:04:48
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:9679BDFFCFC1DA1D852E8F218B335E78
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1802755433.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1802755433.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1801878238.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2461661387.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2463708479.00000000024E9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2463708479.00000000024E9000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2463448129.0000000001FBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2463448129.0000000001FBE000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                        Reputation:low
                                        Has exited:true

                                        Target ID:7
                                        Start time:21:04:49
                                        Start date:14/01/2025
                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                        Wow64 process (32bit):true
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\V01vdyUACe.dll",PlayGame
                                        Imagebase:0xed0000
                                        File size:61'440 bytes
                                        MD5 hash:889B99C52A60DD49227C5E485A016679
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:21:04:49
                                        Start date:14/01/2025
                                        Path:C:\Windows\mssecsvc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\WINDOWS\mssecsvc.exe
                                        Imagebase:0x400000
                                        File size:3'723'264 bytes
                                        MD5 hash:9679BDFFCFC1DA1D852E8F218B335E78
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1831457534.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1809549232.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1809549232.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1831588866.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1831588866.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                        • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1809283291.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:71.8%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:64.9%
                                          Total number of Nodes:37
                                          Total number of Limit Nodes:9

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                          • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                          • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                          • CreateProcessA.KERNELBASE ref: 00407EE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                          • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1824984279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.1824970702.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1824998477.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825085527.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4281112323-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1824984279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.1824970702.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1824998477.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825085527.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1824984279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.1824970702.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1824998477.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825085527.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          • API String ID: 774561529-2614457033
                                          • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                          • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1824984279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.1824970702.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1824998477.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825085527.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                          • API String ID: 3340711343-2450984573
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1824984279.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.1824970702.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1824998477.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825012176.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825085527.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000005.00000002.1825170280.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.1
                                          • API String ID: 4274534310-2839763450
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Execution Graph

                                          Execution Coverage:34.9%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:0%
                                          Total number of Nodes:35
                                          Total number of Limit Nodes:2

                                          Callgraph

                                          Control-flow Graph

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • __p___argc.MSVCRT ref: 004080A5
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                          • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                          • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2461272833.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2461249117.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461343343.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461661387.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461761725.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461818199.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                          • String ID: mssecsvc2.1
                                          • API String ID: 4274534310-2839763450
                                          • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                          • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                          • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                          Control-flow Graph

                                          APIs
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                          • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                          • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                            • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                          Strings
                                          • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2461272833.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2461249117.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461343343.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461661387.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461761725.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461818199.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                          • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          • API String ID: 774561529-2614457033
                                          • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                          • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                          • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                          Control-flow Graph

                                          APIs
                                          • sprintf.MSVCRT ref: 00407C56
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                          • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                          • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2461272833.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2461249117.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461343343.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461661387.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461761725.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461818199.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                          • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                          • API String ID: 3340711343-2450984573
                                          • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                          • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                          • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                          • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                          • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                          • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                          • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                          • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                          • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                          • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                          • sprintf.MSVCRT ref: 00407E01
                                          • sprintf.MSVCRT ref: 00407E18
                                          • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2461272833.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2461249117.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461343343.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461661387.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461761725.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461818199.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                          • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                          • API String ID: 4072214828-1507730452
                                          • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                          • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                          • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.2461272833.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000006.00000002.2461249117.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461343343.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461425461.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461661387.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461761725.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461818199.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 00000006.00000002.2461970204.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                          • String ID:
                                          • API String ID: 801014965-0
                                          • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                          • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                          • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59