Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mLm1d1GV4R.dll

Overview

General Information

Sample name:mLm1d1GV4R.dll
renamed because original name is a hash value
Original sample name:775930a062cfe16caf9a56513d142262.dll
Analysis ID:1591899
MD5:775930a062cfe16caf9a56513d142262
SHA1:ebc7f59387f5b121795b3c3bc37bc77c566baf7b
SHA256:c5eeafb62d5b0fce524e12ad5a94f7e221636dc1bfc8622c8d7e0e61bc0950f8
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3236 cmdline: loaddll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 4280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1732 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4308 cmdline: rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1440 cmdline: rundll32.exe C:\Users\user\Desktop\mLm1d1GV4R.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 3164 cmdline: C:\WINDOWS\mssecsvr.exe MD5: E916117384C8250971067D18F2734F8B)
    • rundll32.exe (PID: 6744 cmdline: rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 6264 cmdline: C:\WINDOWS\mssecsvr.exe MD5: E916117384C8250971067D18F2734F8B)
  • mssecsvr.exe (PID: 2104 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: E916117384C8250971067D18F2734F8B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
mLm1d1GV4R.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    mLm1d1GV4R.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    mLm1d1GV4R.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvr.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        C:\Windows\mssecsvr.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
        • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
        • 0x3136c:$x3: tasksche.exe
        • 0x4157c:$x3: tasksche.exe
        • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
        • 0x415d0:$x5: WNcry@2ol7
        • 0x31344:$x8: C:\%s\qeriuwjhrf
        • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
        • 0xe034:$s1: C:\%s\%s
        • 0x17338:$s1: C:\%s\%s
        • 0x31358:$s1: C:\%s\%s
        • 0x414d0:$s3: cmd.exe /c "%s"
        • 0x73a24:$s4: msg/m_portuguese.wnry
        • 0x2e68c:$s5: \\192.168.56.20\IPC$
        • 0x1ba81:$s6: \\172.16.99.5\IPC$
        • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
        • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
        • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000005.00000000.1727467369.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000008.00000002.1769263752.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                00000008.00000000.1756428845.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                  Click to see the 20 entries
                  SourceRuleDescriptionAuthorStrings
                  6.2.mssecsvr.exe.1d45084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  6.2.mssecsvr.exe.225f8c8.7.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  6.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                  • 0xe8d8:$x3: tasksche.exe
                  • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                  • 0xe92c:$x5: WNcry@2ol7
                  • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                  • 0xe82c:$s3: cmd.exe /c "%s"
                  6.0.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                  • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                  • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                  8.2.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                  • 0xe8d8:$x3: tasksche.exe
                  • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                  • 0xe92c:$x5: WNcry@2ol7
                  • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                  • 0xe82c:$s3: cmd.exe /c "%s"
                  Click to see the 87 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-15T15:40:06.783765+010028033043Unknown Traffic192.168.2.449730103.224.212.21580TCP
                  2025-01-15T15:40:08.564369+010028033043Unknown Traffic192.168.2.449732103.224.212.21580TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-15T15:40:05.834939+010028300181A Network Trojan was detected192.168.2.4596451.1.1.153UDP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: mLm1d1GV4R.dllAvira: detected
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e6207580Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e62075Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c3Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c336Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c315Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c3156aAvira URL Cloud: Label: malware
                  Source: C:\Windows\mssecsvr.exeAvira: detection malicious, Label: TR/WannaCrypt.yteen
                  Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/WannaCrypt.yteen
                  Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 72%
                  Source: C:\Windows\mssecsvr.exeReversingLabs: Detection: 100%
                  Source: C:\Windows\tasksche.exeReversingLabs: Detection: 72%
                  Source: mLm1d1GV4R.dllVirustotal: Detection: 88%Perma Link
                  Source: mLm1d1GV4R.dllReversingLabs: Detection: 92%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                  Source: C:\Windows\mssecsvr.exeJoe Sandbox ML: detected
                  Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                  Source: mLm1d1GV4R.dllJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: mLm1d1GV4R.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.4:59645 -> 1.1.1.1:53
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0140-0612-9098-d266b9c3156a HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0140-08a2-bd71-14f1e6207580 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736952006.1100515
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0140-0955-b54b-361d8820c336 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=04768f6c-8dd5-4f0d-884c-dbdf53d063e1
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49732 -> 103.224.212.215:80
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 103.224.212.215:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.207.211.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.40.242.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.84
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.84
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.84
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.84
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 43.95.77.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.200
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.119.231.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 34.70.129.79
                  Source: unknownTCP traffic detected without corresponding DNS query: 34.70.129.79
                  Source: unknownTCP traffic detected without corresponding DNS query: 34.70.129.79
                  Source: unknownTCP traffic detected without corresponding DNS query: 34.70.129.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 34.70.129.79
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0140-0612-9098-d266b9c3156a HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0140-08a2-bd71-14f1e6207580 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736952006.1100515
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0140-0955-b54b-361d8820c336 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=04768f6c-8dd5-4f0d-884c-dbdf53d063e1
                  Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvr.exe, 00000008.00000003.1768434396.0000000000B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                  Source: mssecsvr.exe, 00000005.00000002.1762689209.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c315
                  Source: mssecsvr.exe, 00000006.00000002.2396715563.0000000000CCA000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000003.1756314790.0000000000D07000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2396715563.0000000000CFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e62075
                  Source: mssecsvr.exe, 00000008.00000002.1770056859.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1770056859.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c3
                  Source: mssecsvr.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvr.exe, 00000008.00000002.1770056859.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                  Source: mssecsvr.exe, 00000006.00000002.2396715563.0000000000CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)
                  Source: mssecsvr.exe, 00000006.00000002.2396715563.0000000000CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/:
                  Source: mssecsvr.exe, 00000005.00000002.1762689209.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/C;
                  Source: mssecsvr.exe, 00000008.00000002.1770056859.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/eX
                  Source: mssecsvr.exe, 00000005.00000002.1762689209.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/i;
                  Source: mssecsvr.exe, 00000008.00000002.1770056859.0000000000AE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/~
                  Source: mssecsvr.exe, 00000006.00000002.2396198170.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                  Source: mssecsvr.exe, 00000008.00000002.1770056859.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comll
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: mLm1d1GV4R.dll, type: SAMPLE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.229196c.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d45084.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.225f8c8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.226e948.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.226e948.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.226a8e8.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvr.exe.1d500a4.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.1727467369.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1769263752.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.1756428845.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1747881309.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.1727598802.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1769427655.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1748144714.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2397201765.000000000226E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.1756535765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2396969286.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 3164, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 2104, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6264, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Windows\mssecsvr.exe, type: DROPPED

                  System Summary

                  barindex
                  Source: mLm1d1GV4R.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: mLm1d1GV4R.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d45084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.225f8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.229196c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.229196c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.229196c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.229196c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d45084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d45084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.225f8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.225f8c8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.226e948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.226e948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvr.exe.226e948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.226e948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.226e948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.226a8e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.226a8e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvr.exe.1d500a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvr.exe.1d500a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000005.00000000.1727598802.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000002.1769427655.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000000.1748144714.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.2397201765.000000000226E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000000.1756535765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.2396969286.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: mssecsvr.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                  Source: tasksche.exe.5.drStatic PE information: No import functions for PE file found
                  Source: mLm1d1GV4R.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  Source: mLm1d1GV4R.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: mLm1d1GV4R.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d45084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.225f8c8.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.229196c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.229196c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d77128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.229196c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.229196c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d45084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d45084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d77128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.225f8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.225f8c8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d54104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.226e948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.226e948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvr.exe.226e948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.226e948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.226e948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d54104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.226a8e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.226a8e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvr.exe.1d500a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvr.exe.1d500a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000005.00000000.1727598802.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000002.1769427655.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000000.1748144714.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.2397201765.000000000226E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000000.1756535765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.2396969286.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: tasksche.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: tasksche.exe.5.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                  Source: tasksche.exe.5.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                  Source: tasksche.exe.5.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                  Source: mLm1d1GV4R.dll, mssecsvr.exe.4.dr, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                  Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/3@2/100
                  Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
                  Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4280:120:WilError_03
                  Source: mLm1d1GV4R.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mLm1d1GV4R.dll,PlayGame
                  Source: mLm1d1GV4R.dllVirustotal: Detection: 88%
                  Source: mLm1d1GV4R.dllReversingLabs: Detection: 92%
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll"
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mLm1d1GV4R.dll,PlayGame
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                  Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",PlayGame
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mLm1d1GV4R.dll,PlayGameJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",PlayGameJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1Jump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: mLm1d1GV4R.dllStatic file information: File size 5267459 > 1048576
                  Source: mLm1d1GV4R.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                  Source: tasksche.exe.5.drStatic PE information: section name: .text entropy: 7.64063717569669

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvr.exe TID: 1508Thread sleep count: 91 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 1508Thread sleep time: -182000s >= -30000sJump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 2756Thread sleep count: 129 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 2756Thread sleep count: 46 > 30Jump to behavior
                  Source: C:\Windows\mssecsvr.exe TID: 1508Thread sleep time: -86400000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                  Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: mssecsvr.exe, 00000008.00000002.1770056859.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW&>
                  Source: mssecsvr.exe, 00000005.00000002.1762689209.0000000000C06000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1762689209.0000000000BD5000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2396715563.0000000000CFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2396715563.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1770056859.0000000000AC6000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1770056859.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: mssecsvr.exe, 00000006.00000002.2396715563.0000000000CFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW&
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1Jump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Service Execution
                  4
                  Windows Service
                  4
                  Windows Service
                  12
                  Masquerading
                  OS Credential Dumping1
                  Network Share Discovery
                  Remote ServicesData from Local System2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  11
                  Process Injection
                  21
                  Virtualization/Sandbox Evasion
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  11
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Obfuscated Files or Information
                  NTDS1
                  System Information Discovery
                  Distributed Component Object ModelInput Capture3
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Rundll32
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Software Packing
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591899 Sample: mLm1d1GV4R.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 37 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->37 39 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->39 41 77026.bodis.com 2->41 51 Suricata IDS alerts for network traffic 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Antivirus detection for URL or domain 2->55 57 8 other signatures 2->57 8 loaddll32.exe 1 2->8         started        10 mssecsvr.exe 12 2->10         started        signatures3 process4 dnsIp5 14 rundll32.exe 8->14         started        16 rundll32.exe 8->16         started        19 cmd.exe 1 8->19         started        21 conhost.exe 8->21         started        43 192.168.2.102 unknown unknown 10->43 45 192.168.2.103 unknown unknown 10->45 47 98 other IPs or domains 10->47 65 Connects to many different private IPs via SMB (likely to spread or exploit) 10->65 67 Connects to many different private IPs (likely to spread or exploit) 10->67 signatures6 process7 signatures8 23 mssecsvr.exe 13 14->23         started        49 Drops executables to the windows directory (C:\Windows) and starts them 16->49 27 mssecsvr.exe 13 16->27         started        29 rundll32.exe 1 19->29         started        process9 file10 31 C:\Windows\tasksche.exe, PE32 23->31 dropped 59 Antivirus detection for dropped file 23->59 61 Multi AV Scanner detection for dropped file 23->61 63 Machine Learning detection for dropped file 23->63 33 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->33 dropped 35 C:\Windows\mssecsvr.exe, PE32 29->35 dropped signatures11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  mLm1d1GV4R.dll89%VirustotalBrowse
                  mLm1d1GV4R.dll92%ReversingLabsWin32.Ransomware.WannaCry
                  mLm1d1GV4R.dll100%AviraTR/AD.DPulsarShellcode.gohtr
                  mLm1d1GV4R.dll100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Windows\mssecsvr.exe100%AviraTR/WannaCrypt.yteen
                  C:\Windows\tasksche.exe100%AviraTR/WannaCrypt.yteen
                  C:\Windows\mssecsvr.exe100%Joe Sandbox ML
                  C:\Windows\tasksche.exe100%Joe Sandbox ML
                  C:\WINDOWS\qeriuwjhrf (copy)72%ReversingLabsWin32.Ransomware.WannaCry
                  C:\Windows\mssecsvr.exe100%ReversingLabsWin32.Ransomware.WannaCry
                  C:\Windows\tasksche.exe72%ReversingLabsWin32.Ransomware.WannaCry
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comll0%Avira URL Cloudsafe
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e6207580100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e62075100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c3100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c336100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c315100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c3156a100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  77026.bodis.com
                  199.59.243.228
                  truefalse
                    high
                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    103.224.212.215
                    truefalse
                      high
                      ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e6207580false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c336false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c3156afalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comllmssecsvr.exe, 00000008.00000002.1770056859.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e62075mssecsvr.exe, 00000006.00000002.2396715563.0000000000CCA000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000003.1756314790.0000000000D07000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2396715563.0000000000CFA000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)mssecsvr.exe, 00000006.00000002.2396715563.0000000000CE9000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000008.00000003.1768434396.0000000000B11000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.commssecsvr.exe.4.drfalse
                                high
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c315mssecsvr.exe, 00000005.00000002.1762689209.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/~mssecsvr.exe, 00000008.00000002.1770056859.0000000000AE3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c3mssecsvr.exe, 00000008.00000002.1770056859.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1770056859.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/:mssecsvr.exe, 00000006.00000002.2396715563.0000000000CE9000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000006.00000002.2396198170.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/C;mssecsvr.exe, 00000005.00000002.1762689209.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/eXmssecsvr.exe, 00000008.00000002.1770056859.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/i;mssecsvr.exe, 00000005.00000002.1762689209.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            205.104.64.1
                                            unknownUnited States
                                            721DNIC-ASBLK-00721-00726USfalse
                                            76.16.231.1
                                            unknownUnited States
                                            7922COMCAST-7922USfalse
                                            13.201.100.1
                                            unknownUnited States
                                            7018ATT-INTERNET4USfalse
                                            76.71.199.22
                                            unknownCanada
                                            577BACOMCAfalse
                                            165.109.216.2
                                            unknownUnited States
                                            7926FICOUSfalse
                                            165.109.216.1
                                            unknownUnited States
                                            7926FICOUSfalse
                                            221.134.212.1
                                            unknownIndia
                                            9583SIFY-AS-INSifyLimitedINfalse
                                            9.190.114.1
                                            unknownUnited States
                                            3356LEVEL3USfalse
                                            163.46.23.25
                                            unknownJapan18126CTCXChubuTelecommunicationsCompanyIncJPfalse
                                            221.134.212.57
                                            unknownIndia
                                            9583SIFY-AS-INSifyLimitedINfalse
                                            7.211.44.86
                                            unknownUnited States
                                            3356LEVEL3USfalse
                                            56.131.124.1
                                            unknownUnited States
                                            2686ATGS-MMD-ASUSfalse
                                            85.207.211.64
                                            unknownCzech Republic
                                            25248BLUETONE-ASTheCzechRepublicCZfalse
                                            20.119.231.200
                                            unknownUnited States
                                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            148.245.140.156
                                            unknownMexico
                                            6503AxtelSABdeCVMXfalse
                                            135.243.33.1
                                            unknownUnited States
                                            10455LUCENT-CIOUSfalse
                                            219.171.12.1
                                            unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                                            158.253.134.29
                                            unknownUnited States
                                            29695ALTIBOX_ASNorwayNOfalse
                                            76.16.231.119
                                            unknownUnited States
                                            7922COMCAST-7922USfalse
                                            163.46.23.1
                                            unknownJapan18126CTCXChubuTelecommunicationsCompanyIncJPfalse
                                            IP
                                            192.168.2.148
                                            192.168.2.149
                                            192.168.2.146
                                            192.168.2.147
                                            192.168.2.140
                                            192.168.2.141
                                            192.168.2.144
                                            192.168.2.145
                                            192.168.2.142
                                            192.168.2.143
                                            192.168.2.159
                                            192.168.2.157
                                            192.168.2.158
                                            192.168.2.151
                                            192.168.2.152
                                            192.168.2.150
                                            192.168.2.155
                                            192.168.2.156
                                            192.168.2.153
                                            192.168.2.154
                                            192.168.2.126
                                            192.168.2.247
                                            192.168.2.127
                                            192.168.2.248
                                            192.168.2.124
                                            192.168.2.245
                                            192.168.2.125
                                            192.168.2.246
                                            192.168.2.128
                                            192.168.2.249
                                            192.168.2.129
                                            192.168.2.240
                                            192.168.2.122
                                            192.168.2.243
                                            192.168.2.123
                                            192.168.2.244
                                            192.168.2.120
                                            192.168.2.241
                                            192.168.2.121
                                            192.168.2.242
                                            192.168.2.97
                                            192.168.2.137
                                            192.168.2.96
                                            192.168.2.138
                                            192.168.2.99
                                            192.168.2.135
                                            192.168.2.98
                                            192.168.2.136
                                            192.168.2.139
                                            192.168.2.250
                                            192.168.2.130
                                            192.168.2.251
                                            192.168.2.91
                                            192.168.2.90
                                            192.168.2.93
                                            192.168.2.133
                                            192.168.2.254
                                            192.168.2.92
                                            192.168.2.134
                                            192.168.2.95
                                            192.168.2.131
                                            192.168.2.252
                                            192.168.2.94
                                            192.168.2.132
                                            192.168.2.253
                                            192.168.2.104
                                            192.168.2.225
                                            192.168.2.105
                                            192.168.2.226
                                            192.168.2.102
                                            192.168.2.223
                                            192.168.2.103
                                            192.168.2.224
                                            192.168.2.108
                                            192.168.2.229
                                            192.168.2.109
                                            192.168.2.106
                                            192.168.2.227
                                            192.168.2.107
                                            192.168.2.228
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1591899
                                            Start date and time:2025-01-15 15:39:08 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 4m 32s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:12
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:mLm1d1GV4R.dll
                                            renamed because original name is a hash value
                                            Original Sample Name:775930a062cfe16caf9a56513d142262.dll
                                            Detection:MAL
                                            Classification:mal100.rans.expl.evad.winDLL@18/3@2/100
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .dll
                                            • Stop behavior analysis, all processes terminated
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                            • Excluded IPs from analysis (whitelisted): 199.232.214.172, 2.23.77.188, 52.149.20.212, 13.107.246.45, 20.109.210.53
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            09:40:07API Interceptor1x Sleep call for process: loaddll32.exe modified
                                            09:40:42API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            77026.bodis.comV01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                            • 199.59.243.228
                                            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comV01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                            • 103.224.212.215
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            DNIC-ASBLK-00721-00726US542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                                            • 214.224.11.1
                                            GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                            • 131.21.241.12
                                            tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                            • 215.188.3.1
                                            F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                            • 206.38.36.1
                                            87c6RORO31.dllGet hashmaliciousWannacryBrowse
                                            • 215.136.68.134
                                            mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                            • 214.131.32.23
                                            Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                            • 199.57.200.151
                                            ppc.elfGet hashmaliciousUnknownBrowse
                                            • 140.156.89.68
                                            i686.elfGet hashmaliciousUnknownBrowse
                                            • 131.16.58.46
                                            x86.elfGet hashmaliciousUnknownBrowse
                                            • 131.81.81.120
                                            COMCAST-7922USalN48K3xcD.dllGet hashmaliciousWannacryBrowse
                                            • 73.32.183.92
                                            bC61G18iPf.dllGet hashmaliciousWannacryBrowse
                                            • 96.157.153.1
                                            178.215.238.129-x86-2025-01-15T04_59_51.elfGet hashmaliciousMiraiBrowse
                                            • 96.202.31.29
                                            ue5QSYCBPt.dllGet hashmaliciousWannacryBrowse
                                            • 28.93.62.1
                                            S8LDvVdtOk.dllGet hashmaliciousWannacryBrowse
                                            • 26.242.207.126
                                            xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                                            • 74.144.36.140
                                            FAuEwllF3K.dllGet hashmaliciousWannacryBrowse
                                            • 25.91.69.1
                                            hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                            • 30.129.64.110
                                            542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                                            • 26.51.77.154
                                            GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                            • 30.7.203.119
                                            BACOMCAmeth3.elfGet hashmaliciousMiraiBrowse
                                            • 142.182.124.250
                                            arm4.elfGet hashmaliciousUnknownBrowse
                                            • 142.180.131.85
                                            m68k.elfGet hashmaliciousUnknownBrowse
                                            • 64.231.99.226
                                            meth4.elfGet hashmaliciousMiraiBrowse
                                            • 67.71.100.52
                                            meth5.elfGet hashmaliciousMiraiBrowse
                                            • 216.208.53.25
                                            elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 64.187.35.217
                                            5.elfGet hashmaliciousUnknownBrowse
                                            • 76.65.11.37
                                            res.sh4.elfGet hashmaliciousUnknownBrowse
                                            • 142.183.202.187
                                            res.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 192.139.223.247
                                            3.elfGet hashmaliciousUnknownBrowse
                                            • 184.147.21.85
                                            ATT-INTERNET4USalN48K3xcD.dllGet hashmaliciousWannacryBrowse
                                            • 13.34.249.4
                                            178.215.238.129-x86-2025-01-15T04_59_51.elfGet hashmaliciousMiraiBrowse
                                            • 107.111.117.177
                                            https://adelademable.org/abujguyaleon.htmlGet hashmaliciousUnknownBrowse
                                            • 13.32.27.129
                                            542CxvZnI5.dllGet hashmaliciousVirut, WannacryBrowse
                                            • 72.151.164.132
                                            tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                            • 107.227.162.245
                                            330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                            • 206.13.39.203
                                            http://industrious-tomato-ngvkcs.mystrikingly.com/Get hashmaliciousUnknownBrowse
                                            • 13.32.27.18
                                            04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                            • 12.2.240.16
                                            habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                            • 75.17.203.1
                                            19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                            • 76.252.20.1
                                            No context
                                            No context
                                            Process:C:\Windows\mssecsvr.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2061938
                                            Entropy (8bit):7.938069166957886
                                            Encrypted:false
                                            SSDEEP:49152:9MSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHEL:9PoBhz1aRxcSUDk36SAEdhkL
                                            MD5:9A426F15B0AC1E4BA38B8A2EBD569139
                                            SHA1:487F106D81CEC6A6109A3DDD184CEC0966ADD074
                                            SHA-256:81F90C2A40D84BFF483418F7DDA1470D34C0C21D794133CE0A09BCD9745F95E5
                                            SHA-512:251294029C9832E3C51F294C8E6AA0ED8BCC81D4B2CDDCF0E917BECAFD86C162FA6A2C437F9189F06DEA3CE39B0B41D42685D49E59B8C7DE74829DA9575D6A24
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 72%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2281472
                                            Entropy (8bit):7.844975658811434
                                            Encrypted:false
                                            SSDEEP:49152:QnnMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHEm:QnPoBhz1aRxcSUDk36SAEdhkm
                                            MD5:E916117384C8250971067D18F2734F8B
                                            SHA1:49515862AD32A93804F787671A4EFF3D0EBF6FC8
                                            SHA-256:09E05A106716C7A1994BC60185129C57A865F378468DFD223E424B51DE1FCBE9
                                            SHA-512:B6E887F017086F2A578A2E82D37749632AA6E11C1C95650D818B3D381AA53BE24ECEAB0358B8E64760DF2EC17BFA3647DB64B1BF50E7B69DA14641C3D3BD8CA3
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 100%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L......................"...................@...........................P......................................................1..z...........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc.........1...... ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\mssecsvr.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2061938
                                            Entropy (8bit):7.938069166957886
                                            Encrypted:false
                                            SSDEEP:49152:9MSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHEL:9PoBhz1aRxcSUDk36SAEdhkL
                                            MD5:9A426F15B0AC1E4BA38B8A2EBD569139
                                            SHA1:487F106D81CEC6A6109A3DDD184CEC0966ADD074
                                            SHA-256:81F90C2A40D84BFF483418F7DDA1470D34C0C21D794133CE0A09BCD9745F95E5
                                            SHA-512:251294029C9832E3C51F294C8E6AA0ED8BCC81D4B2CDDCF0E917BECAFD86C162FA6A2C437F9189F06DEA3CE39B0B41D42685D49E59B8C7DE74829DA9575D6A24
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 72%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):4.2410771620513845
                                            TrID:
                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                            • DOS Executable Generic (2002/1) 0.20%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:mLm1d1GV4R.dll
                                            File size:5'267'459 bytes
                                            MD5:775930a062cfe16caf9a56513d142262
                                            SHA1:ebc7f59387f5b121795b3c3bc37bc77c566baf7b
                                            SHA256:c5eeafb62d5b0fce524e12ad5a94f7e221636dc1bfc8622c8d7e0e61bc0950f8
                                            SHA512:7b5a61545b21ea5f477d86df7af8d53951011f3b062db09a5defb053716bb2bb619c53b5111ddcadba5047029fb41da2cdf3d95ab49466ed33428f372fe98f48
                                            SSDEEP:49152:RnnMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHE:1nPoBhz1aRxcSUDk36SAEdhk
                                            TLSH:A8361266AA18C6B6C11A1731C4F74FF2B6B27CA8D3E616075FA07D2A3D337516E60B01
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                            Icon Hash:7ae282899bbab082
                                            Entrypoint:0x100011e9
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x10000000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                            DLL Characteristics:
                                            Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            push ebx
                                            mov ebx, dword ptr [ebp+08h]
                                            push esi
                                            mov esi, dword ptr [ebp+0Ch]
                                            push edi
                                            mov edi, dword ptr [ebp+10h]
                                            test esi, esi
                                            jne 00007FBA3881FE6Bh
                                            cmp dword ptr [10003140h], 00000000h
                                            jmp 00007FBA3881FE88h
                                            cmp esi, 01h
                                            je 00007FBA3881FE67h
                                            cmp esi, 02h
                                            jne 00007FBA3881FE84h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007FBA3881FE6Bh
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            test eax, eax
                                            je 00007FBA3881FE6Eh
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007FBA3881FD7Ah
                                            test eax, eax
                                            jne 00007FBA3881FE66h
                                            xor eax, eax
                                            jmp 00007FBA3881FEB0h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007FBA3881FC2Ch
                                            cmp esi, 01h
                                            mov dword ptr [ebp+0Ch], eax
                                            jne 00007FBA3881FE6Eh
                                            test eax, eax
                                            jne 00007FBA3881FE99h
                                            push edi
                                            push eax
                                            push ebx
                                            call 00007FBA3881FD56h
                                            test esi, esi
                                            je 00007FBA3881FE67h
                                            cmp esi, 03h
                                            jne 00007FBA3881FE88h
                                            push edi
                                            push esi
                                            push ebx
                                            call 00007FBA3881FD45h
                                            test eax, eax
                                            jne 00007FBA3881FE65h
                                            and dword ptr [ebp+0Ch], eax
                                            cmp dword ptr [ebp+0Ch], 00000000h
                                            je 00007FBA3881FE73h
                                            mov eax, dword ptr [10003150h]
                                            test eax, eax
                                            je 00007FBA3881FE6Ah
                                            push edi
                                            push esi
                                            push ebx
                                            call eax
                                            mov dword ptr [ebp+0Ch], eax
                                            mov eax, dword ptr [ebp+0Ch]
                                            pop edi
                                            pop esi
                                            pop ebx
                                            pop ebp
                                            retn 000Ch
                                            jmp dword ptr [10002028h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            Programming Language:
                                            • [ C ] VS98 (6.0) build 8168
                                            • [C++] VS98 (6.0) build 8168
                                            • [RES] VS98 (6.0) cvtres build 1720
                                            • [LNK] VS98 (6.0) imp/exp build 8168
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x40000x5000600x501000b3d3bb320def8607321bb1b7991d8345unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            W0x40600x500000dataEnglishUnited States0.8791799545288086
                                            DLLImport
                                            KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                            MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                            NameOrdinalAddress
                                            PlayGame10x10001114
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-01-15T15:40:05.834939+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.4596451.1.1.153UDP
                                            2025-01-15T15:40:06.783765+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730103.224.212.21580TCP
                                            2025-01-15T15:40:08.564369+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449732103.224.212.21580TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 15, 2025 15:40:06.161731958 CET4973080192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:06.166552067 CET8049730103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:06.166743040 CET4973080192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:06.166840076 CET4973080192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:06.171587944 CET8049730103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:06.559041023 CET49675443192.168.2.4173.222.162.32
                                            Jan 15, 2025 15:40:06.783262968 CET8049730103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:06.783616066 CET8049730103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:06.783765078 CET4973080192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:06.789230108 CET4973080192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:06.793960094 CET8049730103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:07.119537115 CET4973180192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:07.124444008 CET8049731199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:07.124556065 CET4973180192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:07.126353979 CET4973180192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:07.131175995 CET8049731199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:07.600953102 CET8049731199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:07.600977898 CET8049731199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:07.601058006 CET4973180192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:07.698283911 CET4973180192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:07.699450016 CET4973180192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:07.703222990 CET8049731199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:07.703308105 CET4973180192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:07.956790924 CET4973280192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:07.961592913 CET8049732103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:07.961695910 CET4973280192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:07.962021112 CET4973280192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:07.966763020 CET8049732103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:08.564173937 CET8049732103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:08.564237118 CET8049732103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:08.564368963 CET4973280192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:08.564368963 CET4973280192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:08.579128027 CET4973280192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:08.582530975 CET4973380192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:08.583906889 CET8049732103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:08.587380886 CET8049733199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:08.587447882 CET4973380192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:08.587573051 CET4973380192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:08.592437983 CET8049733199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:08.695084095 CET4973480192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:08.699934959 CET8049734103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:08.700046062 CET4973480192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:08.700165987 CET4973480192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:08.704909086 CET8049734103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:09.060187101 CET8049733199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:09.060208082 CET8049733199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:09.060246944 CET4973380192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.060266018 CET4973380192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.068785906 CET4973380192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.068806887 CET4973380192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.122154951 CET49735445192.168.2.485.207.211.64
                                            Jan 15, 2025 15:40:09.127006054 CET4454973585.207.211.64192.168.2.4
                                            Jan 15, 2025 15:40:09.127085924 CET49735445192.168.2.485.207.211.64
                                            Jan 15, 2025 15:40:09.127119064 CET49735445192.168.2.485.207.211.64
                                            Jan 15, 2025 15:40:09.127289057 CET49736445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:09.131993055 CET4454973585.207.211.64192.168.2.4
                                            Jan 15, 2025 15:40:09.132047892 CET49735445192.168.2.485.207.211.64
                                            Jan 15, 2025 15:40:09.132059097 CET4454973685.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:09.132122040 CET49736445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:09.132694960 CET49736445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:09.137861967 CET4454973685.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:09.137926102 CET49736445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:09.143595934 CET49737445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:09.148403883 CET4454973785.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:09.148467064 CET49737445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:09.148528099 CET49737445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:09.153311014 CET4454973785.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:09.316423893 CET8049734103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:09.316490889 CET8049734103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:09.316490889 CET4973480192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:09.316529989 CET4973480192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:09.318639040 CET4973480192.168.2.4103.224.212.215
                                            Jan 15, 2025 15:40:09.320467949 CET4974280192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.323401928 CET8049734103.224.212.215192.168.2.4
                                            Jan 15, 2025 15:40:09.325318098 CET8049742199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:09.325388908 CET4974280192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.325578928 CET4974280192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.330316067 CET8049742199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:09.790345907 CET8049742199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:09.790370941 CET8049742199.59.243.228192.168.2.4
                                            Jan 15, 2025 15:40:09.790421009 CET4974280192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.790487051 CET4974280192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.800971031 CET4974280192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:09.800993919 CET4974280192.168.2.4199.59.243.228
                                            Jan 15, 2025 15:40:11.122744083 CET49761445192.168.2.475.40.242.200
                                            Jan 15, 2025 15:40:11.127665043 CET4454976175.40.242.200192.168.2.4
                                            Jan 15, 2025 15:40:11.127737999 CET49761445192.168.2.475.40.242.200
                                            Jan 15, 2025 15:40:11.127830029 CET49761445192.168.2.475.40.242.200
                                            Jan 15, 2025 15:40:11.128238916 CET49762445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:11.133029938 CET4454976275.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:11.133100033 CET49762445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:11.133131981 CET49762445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:11.133214951 CET4454976175.40.242.200192.168.2.4
                                            Jan 15, 2025 15:40:11.133268118 CET49761445192.168.2.475.40.242.200
                                            Jan 15, 2025 15:40:11.134363890 CET49763445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:11.137965918 CET4454976275.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:11.138020039 CET49762445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:11.139256954 CET4454976375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:11.139336109 CET49763445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:11.139363050 CET49763445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:11.144179106 CET4454976375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:13.138967991 CET49786445192.168.2.443.95.77.84
                                            Jan 15, 2025 15:40:13.143811941 CET4454978643.95.77.84192.168.2.4
                                            Jan 15, 2025 15:40:13.143886089 CET49786445192.168.2.443.95.77.84
                                            Jan 15, 2025 15:40:13.143919945 CET49786445192.168.2.443.95.77.84
                                            Jan 15, 2025 15:40:13.144109011 CET49787445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:13.149013042 CET4454978743.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:13.149074078 CET49787445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:13.149139881 CET49787445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:13.149949074 CET4454978643.95.77.84192.168.2.4
                                            Jan 15, 2025 15:40:13.149997950 CET49786445192.168.2.443.95.77.84
                                            Jan 15, 2025 15:40:13.150566101 CET49788445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:13.154158115 CET4454978743.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:13.154217958 CET49787445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:13.155364037 CET4454978843.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:13.155425072 CET49788445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:13.155462980 CET49788445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:13.160238028 CET4454978843.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:15.167879105 CET49810445192.168.2.420.119.231.200
                                            Jan 15, 2025 15:40:15.172792912 CET4454981020.119.231.200192.168.2.4
                                            Jan 15, 2025 15:40:15.172884941 CET49810445192.168.2.420.119.231.200
                                            Jan 15, 2025 15:40:15.173044920 CET49810445192.168.2.420.119.231.200
                                            Jan 15, 2025 15:40:15.173176050 CET49812445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:15.177886009 CET4454981020.119.231.200192.168.2.4
                                            Jan 15, 2025 15:40:15.177949905 CET49810445192.168.2.420.119.231.200
                                            Jan 15, 2025 15:40:15.177966118 CET4454981220.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:15.178018093 CET49812445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:15.178106070 CET49812445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:15.182971001 CET4454981220.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:15.183034897 CET49812445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:15.187146902 CET49813445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:15.192035913 CET4454981320.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:15.192111015 CET49813445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:15.192184925 CET49813445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:15.196933031 CET4454981320.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:17.169877052 CET49832445192.168.2.434.70.129.79
                                            Jan 15, 2025 15:40:17.174841881 CET4454983234.70.129.79192.168.2.4
                                            Jan 15, 2025 15:40:17.174931049 CET49832445192.168.2.434.70.129.79
                                            Jan 15, 2025 15:40:17.175169945 CET49832445192.168.2.434.70.129.79
                                            Jan 15, 2025 15:40:17.175559998 CET49833445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:17.179964066 CET4454983234.70.129.79192.168.2.4
                                            Jan 15, 2025 15:40:17.180094004 CET49832445192.168.2.434.70.129.79
                                            Jan 15, 2025 15:40:17.180341959 CET4454983334.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:17.180408001 CET49833445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:17.180428028 CET49833445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:17.181355000 CET49834445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:17.185954094 CET4454983334.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:17.186007023 CET49833445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:17.186177015 CET4454983434.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:17.186261892 CET49834445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:17.186311960 CET49834445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:17.191056013 CET4454983434.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:19.185401917 CET49855445192.168.2.4165.109.216.71
                                            Jan 15, 2025 15:40:19.190412045 CET44549855165.109.216.71192.168.2.4
                                            Jan 15, 2025 15:40:19.190495014 CET49855445192.168.2.4165.109.216.71
                                            Jan 15, 2025 15:40:19.190604925 CET49855445192.168.2.4165.109.216.71
                                            Jan 15, 2025 15:40:19.190911055 CET49856445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:19.195650101 CET44549855165.109.216.71192.168.2.4
                                            Jan 15, 2025 15:40:19.195736885 CET44549856165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:19.195761919 CET49855445192.168.2.4165.109.216.71
                                            Jan 15, 2025 15:40:19.195812941 CET49856445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:19.195863962 CET49856445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:19.197340012 CET49857445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:19.201308012 CET44549856165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:19.201384068 CET49856445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:19.202513933 CET44549857165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:19.202604055 CET49857445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:19.202694893 CET49857445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:19.207401991 CET44549857165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:20.918807983 CET4972380192.168.2.4199.232.210.172
                                            Jan 15, 2025 15:40:20.924346924 CET8049723199.232.210.172192.168.2.4
                                            Jan 15, 2025 15:40:20.924412012 CET4972380192.168.2.4199.232.210.172
                                            Jan 15, 2025 15:40:21.199878931 CET49884445192.168.2.4111.199.171.239
                                            Jan 15, 2025 15:40:21.204822063 CET44549884111.199.171.239192.168.2.4
                                            Jan 15, 2025 15:40:21.204899073 CET49884445192.168.2.4111.199.171.239
                                            Jan 15, 2025 15:40:21.204927921 CET49884445192.168.2.4111.199.171.239
                                            Jan 15, 2025 15:40:21.205106020 CET49885445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:21.209918976 CET44549884111.199.171.239192.168.2.4
                                            Jan 15, 2025 15:40:21.209953070 CET44549885111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:21.209981918 CET49884445192.168.2.4111.199.171.239
                                            Jan 15, 2025 15:40:21.210021019 CET49885445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:21.210114956 CET49885445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:21.210386992 CET49886445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:21.215053082 CET44549885111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:21.215274096 CET44549886111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:21.215333939 CET49885445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:21.215358019 CET49886445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:21.215418100 CET49886445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:21.220232964 CET44549886111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:23.215852976 CET49911445192.168.2.476.71.199.22
                                            Jan 15, 2025 15:40:23.220804930 CET4454991176.71.199.22192.168.2.4
                                            Jan 15, 2025 15:40:23.220899105 CET49911445192.168.2.476.71.199.22
                                            Jan 15, 2025 15:40:23.220944881 CET49911445192.168.2.476.71.199.22
                                            Jan 15, 2025 15:40:23.221054077 CET49912445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:23.225960016 CET4454991176.71.199.22192.168.2.4
                                            Jan 15, 2025 15:40:23.225990057 CET4454991276.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:23.226039886 CET49911445192.168.2.476.71.199.22
                                            Jan 15, 2025 15:40:23.226068020 CET49912445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:23.226080894 CET49912445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:23.226259947 CET49913445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:23.231113911 CET4454991276.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:23.231147051 CET4454991376.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:23.231199980 CET49912445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:23.231215954 CET49913445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:23.231254101 CET49913445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:23.236258030 CET4454991376.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:25.231451988 CET49935445192.168.2.432.41.128.239
                                            Jan 15, 2025 15:40:25.236372948 CET4454993532.41.128.239192.168.2.4
                                            Jan 15, 2025 15:40:25.239413023 CET49935445192.168.2.432.41.128.239
                                            Jan 15, 2025 15:40:25.239453077 CET49935445192.168.2.432.41.128.239
                                            Jan 15, 2025 15:40:25.239599943 CET49936445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:25.244435072 CET4454993632.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:25.244477987 CET4454993532.41.128.239192.168.2.4
                                            Jan 15, 2025 15:40:25.244517088 CET49936445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:25.244544983 CET49935445192.168.2.432.41.128.239
                                            Jan 15, 2025 15:40:25.244615078 CET49936445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:25.244863987 CET49937445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:25.249510050 CET4454993632.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:25.249583960 CET49936445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:25.249671936 CET4454993732.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:25.250355959 CET49937445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:25.250400066 CET49937445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:25.255220890 CET4454993732.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:27.246754885 CET49960445192.168.2.4183.201.58.208
                                            Jan 15, 2025 15:40:27.251645088 CET44549960183.201.58.208192.168.2.4
                                            Jan 15, 2025 15:40:27.251729965 CET49960445192.168.2.4183.201.58.208
                                            Jan 15, 2025 15:40:27.251769066 CET49960445192.168.2.4183.201.58.208
                                            Jan 15, 2025 15:40:27.252024889 CET49961445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:27.256650925 CET44549960183.201.58.208192.168.2.4
                                            Jan 15, 2025 15:40:27.256700039 CET49960445192.168.2.4183.201.58.208
                                            Jan 15, 2025 15:40:27.256814003 CET44549961183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:27.256875992 CET49961445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:27.256910086 CET49961445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:27.257221937 CET49962445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:27.261790037 CET44549961183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:27.261856079 CET49961445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:27.261992931 CET44549962183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:27.262038946 CET49962445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:27.262053013 CET49962445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:27.266820908 CET44549962183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:29.263159990 CET49983445192.168.2.4150.113.209.75
                                            Jan 15, 2025 15:40:29.267970085 CET44549983150.113.209.75192.168.2.4
                                            Jan 15, 2025 15:40:29.268090963 CET49983445192.168.2.4150.113.209.75
                                            Jan 15, 2025 15:40:29.268090963 CET49983445192.168.2.4150.113.209.75
                                            Jan 15, 2025 15:40:29.268364906 CET49984445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:29.272994995 CET44549983150.113.209.75192.168.2.4
                                            Jan 15, 2025 15:40:29.273216009 CET49983445192.168.2.4150.113.209.75
                                            Jan 15, 2025 15:40:29.273245096 CET44549984150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:29.273312092 CET49984445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:29.273396015 CET49984445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:29.273565054 CET49985445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:29.278362989 CET44549985150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:29.278423071 CET49985445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:29.278445959 CET49985445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:29.278918028 CET44549984150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:29.278976917 CET49984445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:29.283216953 CET44549985150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:30.532880068 CET4454973785.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:30.532974005 CET49737445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:30.533036947 CET49737445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:30.533107042 CET49737445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:30.538054943 CET4454973785.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:30.538141966 CET4454973785.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:31.278137922 CET50007445192.168.2.4163.46.23.25
                                            Jan 15, 2025 15:40:31.282984972 CET44550007163.46.23.25192.168.2.4
                                            Jan 15, 2025 15:40:31.283071995 CET50007445192.168.2.4163.46.23.25
                                            Jan 15, 2025 15:40:31.283107042 CET50007445192.168.2.4163.46.23.25
                                            Jan 15, 2025 15:40:31.283301115 CET50008445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:31.288182974 CET44550008163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:31.288214922 CET44550007163.46.23.25192.168.2.4
                                            Jan 15, 2025 15:40:31.288259029 CET50008445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:31.288286924 CET50007445192.168.2.4163.46.23.25
                                            Jan 15, 2025 15:40:31.288397074 CET50008445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:31.288722992 CET50009445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:31.293272018 CET44550008163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:31.293334007 CET50008445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:31.293572903 CET44550009163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:31.293629885 CET50009445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:31.293653011 CET50009445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:31.298505068 CET44550009163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:32.528517962 CET4454976375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:32.528657913 CET49763445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:32.528702974 CET49763445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:32.528776884 CET49763445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:32.533565998 CET4454976375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:32.533595085 CET4454976375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:33.293762922 CET50032445192.168.2.456.131.124.59
                                            Jan 15, 2025 15:40:33.298681021 CET4455003256.131.124.59192.168.2.4
                                            Jan 15, 2025 15:40:33.298857927 CET50032445192.168.2.456.131.124.59
                                            Jan 15, 2025 15:40:33.298858881 CET50032445192.168.2.456.131.124.59
                                            Jan 15, 2025 15:40:33.298939943 CET50033445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:33.303764105 CET4455003356.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:33.303872108 CET50033445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:33.303884029 CET50033445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:33.303951025 CET4455003256.131.124.59192.168.2.4
                                            Jan 15, 2025 15:40:33.304011106 CET50032445192.168.2.456.131.124.59
                                            Jan 15, 2025 15:40:33.304223061 CET50034445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:33.309153080 CET4455003456.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:33.309278011 CET50034445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:33.309324026 CET50034445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:33.311378002 CET4455003356.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:33.312745094 CET4455003356.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:33.312794924 CET50033445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:33.314137936 CET4455003456.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:33.543556929 CET50038445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:33.550335884 CET4455003885.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:33.550434113 CET50038445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:33.550482988 CET50038445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:33.558953047 CET4455003885.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:34.530637980 CET4454978843.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:34.530827045 CET49788445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:34.530827045 CET49788445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:34.530873060 CET49788445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:34.535768986 CET4454978843.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:34.535798073 CET4454978843.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:35.309659004 CET50040445192.168.2.410.10.127.62
                                            Jan 15, 2025 15:40:35.314596891 CET4455004010.10.127.62192.168.2.4
                                            Jan 15, 2025 15:40:35.314701080 CET50040445192.168.2.410.10.127.62
                                            Jan 15, 2025 15:40:35.314766884 CET50040445192.168.2.410.10.127.62
                                            Jan 15, 2025 15:40:35.314893007 CET50041445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:35.319600105 CET4455004010.10.127.62192.168.2.4
                                            Jan 15, 2025 15:40:35.319655895 CET50040445192.168.2.410.10.127.62
                                            Jan 15, 2025 15:40:35.319690943 CET4455004110.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:35.319740057 CET50041445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:35.319802046 CET50041445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:35.320018053 CET50042445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:35.324634075 CET4455004110.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:35.324680090 CET50041445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:35.324836969 CET4455004210.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:35.324894905 CET50042445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:35.324938059 CET50042445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:35.329725027 CET4455004210.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:35.543581009 CET50043445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:35.548446894 CET4455004375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:35.548532009 CET50043445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:35.548624992 CET50043445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:35.553411961 CET4455004375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:36.574475050 CET4454981320.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:36.575190067 CET49813445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:36.575239897 CET49813445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:36.575330019 CET49813445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:36.580168009 CET4454981320.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:36.580198050 CET4454981320.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:37.325073957 CET50044445192.168.2.4126.222.69.217
                                            Jan 15, 2025 15:40:37.329947948 CET44550044126.222.69.217192.168.2.4
                                            Jan 15, 2025 15:40:37.330082893 CET50044445192.168.2.4126.222.69.217
                                            Jan 15, 2025 15:40:37.330147028 CET50044445192.168.2.4126.222.69.217
                                            Jan 15, 2025 15:40:37.330282927 CET50045445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:37.334985018 CET44550044126.222.69.217192.168.2.4
                                            Jan 15, 2025 15:40:37.335086107 CET50044445192.168.2.4126.222.69.217
                                            Jan 15, 2025 15:40:37.335139036 CET44550045126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:40:37.335226059 CET50045445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:37.335263968 CET50045445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:37.335661888 CET50046445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:37.340264082 CET44550045126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:40:37.340337992 CET50045445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:37.340450048 CET44550046126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:40:37.340514898 CET50046445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:37.340567112 CET50046445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:37.345352888 CET44550046126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:40:37.543615103 CET50047445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:37.548521042 CET4455004743.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:37.548640013 CET50047445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:37.548787117 CET50047445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:37.553505898 CET4455004743.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:38.573852062 CET4454983434.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:38.574038029 CET49834445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:38.574105024 CET49834445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:38.574191093 CET49834445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:38.579700947 CET4454983434.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:38.579787016 CET4454983434.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:39.341056108 CET50048445192.168.2.4135.243.33.218
                                            Jan 15, 2025 15:40:39.345904112 CET44550048135.243.33.218192.168.2.4
                                            Jan 15, 2025 15:40:39.346097946 CET50048445192.168.2.4135.243.33.218
                                            Jan 15, 2025 15:40:39.346097946 CET50048445192.168.2.4135.243.33.218
                                            Jan 15, 2025 15:40:39.346227884 CET50049445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:40:39.351057053 CET44550049135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:40:39.351130962 CET50049445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:40:39.351210117 CET50049445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:40:39.351213932 CET44550048135.243.33.218192.168.2.4
                                            Jan 15, 2025 15:40:39.351272106 CET50048445192.168.2.4135.243.33.218
                                            Jan 15, 2025 15:40:39.351497889 CET50050445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:40:39.356329918 CET44550049135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:40:39.356359959 CET44550050135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:40:39.356416941 CET50049445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:40:39.356522083 CET50050445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:40:39.356612921 CET50050445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:40:39.361496925 CET44550050135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:40:39.590598106 CET50051445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:39.595391989 CET4455005120.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:39.595504999 CET50051445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:39.595555067 CET50051445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:40:39.600281954 CET4455005120.119.231.1192.168.2.4
                                            Jan 15, 2025 15:40:40.558826923 CET44549857165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:40.558954954 CET49857445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:40.559062004 CET49857445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:40.559190989 CET49857445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:40.563905954 CET44549857165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:40.564029932 CET44549857165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:41.356219053 CET50052445192.168.2.479.143.219.148
                                            Jan 15, 2025 15:40:41.379796982 CET4455005279.143.219.148192.168.2.4
                                            Jan 15, 2025 15:40:41.379885912 CET50052445192.168.2.479.143.219.148
                                            Jan 15, 2025 15:40:41.380014896 CET50052445192.168.2.479.143.219.148
                                            Jan 15, 2025 15:40:41.380212069 CET50053445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:40:41.384941101 CET4455005279.143.219.148192.168.2.4
                                            Jan 15, 2025 15:40:41.385019064 CET4455005379.143.219.1192.168.2.4
                                            Jan 15, 2025 15:40:41.385020971 CET50052445192.168.2.479.143.219.148
                                            Jan 15, 2025 15:40:41.385077000 CET50053445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:40:41.385133028 CET50053445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:40:41.385422945 CET50054445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:40:41.390062094 CET4455005379.143.219.1192.168.2.4
                                            Jan 15, 2025 15:40:41.390134096 CET50053445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:40:41.390259981 CET4455005479.143.219.1192.168.2.4
                                            Jan 15, 2025 15:40:41.390321970 CET50054445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:40:41.390361071 CET50054445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:40:41.395215034 CET4455005479.143.219.1192.168.2.4
                                            Jan 15, 2025 15:40:41.574938059 CET50055445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:41.579860926 CET4455005534.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:41.580014944 CET50055445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:41.580135107 CET50055445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:40:41.584958076 CET4455005534.70.129.1192.168.2.4
                                            Jan 15, 2025 15:40:42.574582100 CET44549886111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:42.574651957 CET49886445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:42.574697971 CET49886445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:42.574752092 CET49886445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:42.579577923 CET44549886111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:42.579607964 CET44549886111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:43.372138023 CET50056445192.168.2.494.240.109.39
                                            Jan 15, 2025 15:40:43.574975967 CET50057445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:44.251537085 CET4455005694.240.109.39192.168.2.4
                                            Jan 15, 2025 15:40:44.251594067 CET44550057165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:44.251728058 CET50056445192.168.2.494.240.109.39
                                            Jan 15, 2025 15:40:44.251769066 CET50056445192.168.2.494.240.109.39
                                            Jan 15, 2025 15:40:44.251873016 CET50057445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:44.251873016 CET50057445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:40:44.252055883 CET50058445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:40:44.256707907 CET4455005694.240.109.39192.168.2.4
                                            Jan 15, 2025 15:40:44.256759882 CET44550057165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:40:44.256841898 CET50056445192.168.2.494.240.109.39
                                            Jan 15, 2025 15:40:44.256907940 CET4455005894.240.109.1192.168.2.4
                                            Jan 15, 2025 15:40:44.256978035 CET50058445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:40:44.257031918 CET50058445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:40:44.257410049 CET50059445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:40:44.262111902 CET4455005894.240.109.1192.168.2.4
                                            Jan 15, 2025 15:40:44.262187004 CET50058445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:40:44.262236118 CET4455005994.240.109.1192.168.2.4
                                            Jan 15, 2025 15:40:44.262303114 CET50059445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:40:44.262345076 CET50059445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:40:44.267175913 CET4455005994.240.109.1192.168.2.4
                                            Jan 15, 2025 15:40:44.591468096 CET4454991376.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:44.591597080 CET49913445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:44.591638088 CET49913445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:44.591686964 CET49913445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:44.597315073 CET4454991376.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:44.597846031 CET4454991376.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:45.269994974 CET50060445192.168.2.4139.184.56.228
                                            Jan 15, 2025 15:40:45.274892092 CET44550060139.184.56.228192.168.2.4
                                            Jan 15, 2025 15:40:45.274981976 CET50060445192.168.2.4139.184.56.228
                                            Jan 15, 2025 15:40:45.279339075 CET50060445192.168.2.4139.184.56.228
                                            Jan 15, 2025 15:40:45.279504061 CET50061445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:40:45.284207106 CET44550060139.184.56.228192.168.2.4
                                            Jan 15, 2025 15:40:45.284272909 CET50060445192.168.2.4139.184.56.228
                                            Jan 15, 2025 15:40:45.284413099 CET44550061139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:40:45.284472942 CET50061445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:40:45.288459063 CET50061445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:40:45.293389082 CET44550061139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:40:45.293458939 CET50061445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:40:45.308940887 CET50062445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:40:45.313848019 CET44550062139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:40:45.313908100 CET50062445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:40:45.313930988 CET50062445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:40:45.318799019 CET44550062139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:40:45.590334892 CET50063445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:45.595689058 CET44550063111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:45.595777035 CET50063445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:45.595813990 CET50063445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:40:45.601073980 CET44550063111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:40:46.622755051 CET4454993732.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:46.622972965 CET49937445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:46.623028040 CET49937445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:46.623085976 CET49937445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:46.627835035 CET4454993732.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:46.627918005 CET4454993732.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:47.606612921 CET50065445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:47.611387014 CET4455006576.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:47.611449957 CET50065445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:47.611485958 CET50065445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:40:47.616347075 CET4455006576.71.199.1192.168.2.4
                                            Jan 15, 2025 15:40:48.121634960 CET50066445192.168.2.476.16.231.119
                                            Jan 15, 2025 15:40:48.126477003 CET4455006676.16.231.119192.168.2.4
                                            Jan 15, 2025 15:40:48.126542091 CET50066445192.168.2.476.16.231.119
                                            Jan 15, 2025 15:40:48.126621962 CET50066445192.168.2.476.16.231.119
                                            Jan 15, 2025 15:40:48.126770020 CET50067445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:40:48.131455898 CET4455006676.16.231.119192.168.2.4
                                            Jan 15, 2025 15:40:48.131503105 CET50066445192.168.2.476.16.231.119
                                            Jan 15, 2025 15:40:48.131545067 CET4455006776.16.231.1192.168.2.4
                                            Jan 15, 2025 15:40:48.131803989 CET50067445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:40:48.131869078 CET50067445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:40:48.132167101 CET50068445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:40:48.136923075 CET4455006776.16.231.1192.168.2.4
                                            Jan 15, 2025 15:40:48.136934996 CET4455006876.16.231.1192.168.2.4
                                            Jan 15, 2025 15:40:48.137012959 CET50067445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:40:48.137043953 CET50068445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:40:48.137087107 CET50068445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:40:48.141870975 CET4455006876.16.231.1192.168.2.4
                                            Jan 15, 2025 15:40:48.622744083 CET44549962183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:48.622817993 CET49962445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:48.622857094 CET49962445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:48.622870922 CET49962445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:48.627667904 CET44549962183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:48.627697945 CET44549962183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:48.653281927 CET50069445192.168.2.4223.125.161.111
                                            Jan 15, 2025 15:40:48.658080101 CET44550069223.125.161.111192.168.2.4
                                            Jan 15, 2025 15:40:48.658164024 CET50069445192.168.2.4223.125.161.111
                                            Jan 15, 2025 15:40:48.658251047 CET50069445192.168.2.4223.125.161.111
                                            Jan 15, 2025 15:40:48.658472061 CET50070445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:40:48.663135052 CET44550069223.125.161.111192.168.2.4
                                            Jan 15, 2025 15:40:48.663203955 CET50069445192.168.2.4223.125.161.111
                                            Jan 15, 2025 15:40:48.663327932 CET44550070223.125.161.1192.168.2.4
                                            Jan 15, 2025 15:40:48.663397074 CET50070445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:40:48.663455009 CET50070445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:40:48.663769960 CET50071445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:40:48.668281078 CET44550070223.125.161.1192.168.2.4
                                            Jan 15, 2025 15:40:48.668365002 CET50070445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:40:48.668625116 CET44550071223.125.161.1192.168.2.4
                                            Jan 15, 2025 15:40:48.668680906 CET50071445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:40:48.668720961 CET50071445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:40:48.673537016 CET44550071223.125.161.1192.168.2.4
                                            Jan 15, 2025 15:40:49.637392998 CET50072445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:49.642215014 CET4455007232.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:49.642299891 CET50072445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:49.642321110 CET50072445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:40:49.647123098 CET4455007232.41.128.1192.168.2.4
                                            Jan 15, 2025 15:40:50.184590101 CET50073445192.168.2.4205.104.64.10
                                            Jan 15, 2025 15:40:50.189418077 CET44550073205.104.64.10192.168.2.4
                                            Jan 15, 2025 15:40:50.189511061 CET50073445192.168.2.4205.104.64.10
                                            Jan 15, 2025 15:40:50.189593077 CET50073445192.168.2.4205.104.64.10
                                            Jan 15, 2025 15:40:50.189713001 CET50074445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:40:50.194999933 CET44550074205.104.64.1192.168.2.4
                                            Jan 15, 2025 15:40:50.195193052 CET50074445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:40:50.195290089 CET50074445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:40:50.195321083 CET44550073205.104.64.10192.168.2.4
                                            Jan 15, 2025 15:40:50.195636034 CET50075445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:40:50.196489096 CET44550073205.104.64.10192.168.2.4
                                            Jan 15, 2025 15:40:50.196547985 CET50073445192.168.2.4205.104.64.10
                                            Jan 15, 2025 15:40:50.200506926 CET44550075205.104.64.1192.168.2.4
                                            Jan 15, 2025 15:40:50.200577974 CET50075445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:40:50.200630903 CET50075445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:40:50.201255083 CET44550074205.104.64.1192.168.2.4
                                            Jan 15, 2025 15:40:50.201320887 CET50074445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:40:50.205399036 CET44550075205.104.64.1192.168.2.4
                                            Jan 15, 2025 15:40:50.654041052 CET44549985150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:50.654122114 CET49985445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:50.654161930 CET49985445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:50.654222012 CET49985445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:50.658981085 CET44549985150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:50.658992052 CET44549985150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:51.606475115 CET50076445192.168.2.452.127.103.109
                                            Jan 15, 2025 15:40:51.611293077 CET4455007652.127.103.109192.168.2.4
                                            Jan 15, 2025 15:40:51.611412048 CET50076445192.168.2.452.127.103.109
                                            Jan 15, 2025 15:40:51.611443043 CET50076445192.168.2.452.127.103.109
                                            Jan 15, 2025 15:40:51.611615896 CET50077445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:40:51.616362095 CET4455007752.127.103.1192.168.2.4
                                            Jan 15, 2025 15:40:51.616465092 CET50077445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:40:51.616554022 CET4455007652.127.103.109192.168.2.4
                                            Jan 15, 2025 15:40:51.616561890 CET50077445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:40:51.616606951 CET50076445192.168.2.452.127.103.109
                                            Jan 15, 2025 15:40:51.616879940 CET50078445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:40:51.621637106 CET4455007852.127.103.1192.168.2.4
                                            Jan 15, 2025 15:40:51.621733904 CET50078445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:40:51.621792078 CET50078445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:40:51.621957064 CET4455007752.127.103.1192.168.2.4
                                            Jan 15, 2025 15:40:51.622014046 CET50077445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:40:51.626502991 CET4455007852.127.103.1192.168.2.4
                                            Jan 15, 2025 15:40:51.637408972 CET50079445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:51.642191887 CET44550079183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:51.642267942 CET50079445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:51.642302990 CET50079445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:40:51.647097111 CET44550079183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:40:52.658588886 CET44550009163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:52.658735991 CET50009445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:52.658735991 CET50009445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:52.658787966 CET50009445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:52.663526058 CET44550009163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:52.663697004 CET44550009163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:52.934477091 CET50080445192.168.2.4219.171.12.201
                                            Jan 15, 2025 15:40:52.939421892 CET44550080219.171.12.201192.168.2.4
                                            Jan 15, 2025 15:40:52.939532042 CET50080445192.168.2.4219.171.12.201
                                            Jan 15, 2025 15:40:52.939671993 CET50080445192.168.2.4219.171.12.201
                                            Jan 15, 2025 15:40:52.939862013 CET50081445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:40:52.944653988 CET44550081219.171.12.1192.168.2.4
                                            Jan 15, 2025 15:40:52.944727898 CET50081445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:40:52.944750071 CET44550080219.171.12.201192.168.2.4
                                            Jan 15, 2025 15:40:52.944751978 CET50081445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:40:52.944802999 CET50080445192.168.2.4219.171.12.201
                                            Jan 15, 2025 15:40:52.945076942 CET50082445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:40:52.949904919 CET44550082219.171.12.1192.168.2.4
                                            Jan 15, 2025 15:40:52.949970961 CET50082445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:40:52.950012922 CET50082445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:40:52.950071096 CET44550081219.171.12.1192.168.2.4
                                            Jan 15, 2025 15:40:52.950119972 CET50081445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:40:52.954788923 CET44550082219.171.12.1192.168.2.4
                                            Jan 15, 2025 15:40:53.668521881 CET50083445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:53.673379898 CET44550083150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:53.673628092 CET50083445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:53.673666954 CET50083445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:40:53.678476095 CET44550083150.113.209.1192.168.2.4
                                            Jan 15, 2025 15:40:54.169100046 CET50084445192.168.2.468.7.6.18
                                            Jan 15, 2025 15:40:54.174618006 CET4455008468.7.6.18192.168.2.4
                                            Jan 15, 2025 15:40:54.174717903 CET50084445192.168.2.468.7.6.18
                                            Jan 15, 2025 15:40:54.174992085 CET50084445192.168.2.468.7.6.18
                                            Jan 15, 2025 15:40:54.175358057 CET50085445192.168.2.468.7.6.1
                                            Jan 15, 2025 15:40:54.180615902 CET4455008568.7.6.1192.168.2.4
                                            Jan 15, 2025 15:40:54.180633068 CET4455008468.7.6.18192.168.2.4
                                            Jan 15, 2025 15:40:54.180702925 CET50084445192.168.2.468.7.6.18
                                            Jan 15, 2025 15:40:54.180735111 CET50085445192.168.2.468.7.6.1
                                            Jan 15, 2025 15:40:54.181088924 CET50086445192.168.2.468.7.6.1
                                            Jan 15, 2025 15:40:54.187362909 CET4455008568.7.6.1192.168.2.4
                                            Jan 15, 2025 15:40:54.187374115 CET4455008668.7.6.1192.168.2.4
                                            Jan 15, 2025 15:40:54.187463045 CET50085445192.168.2.468.7.6.1
                                            Jan 15, 2025 15:40:54.187484026 CET50086445192.168.2.468.7.6.1
                                            Jan 15, 2025 15:40:54.187547922 CET50086445192.168.2.468.7.6.1
                                            Jan 15, 2025 15:40:54.192889929 CET4455008668.7.6.1192.168.2.4
                                            Jan 15, 2025 15:40:54.701343060 CET4455003456.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:54.701415062 CET50034445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:54.701471090 CET50034445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:54.701533079 CET50034445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:54.706439972 CET4455003456.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:54.706450939 CET4455003456.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:54.919661045 CET4455003885.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:54.919744015 CET50038445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:54.919807911 CET50038445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:54.919871092 CET50038445192.168.2.485.207.211.1
                                            Jan 15, 2025 15:40:54.924535036 CET4455003885.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:54.924896955 CET4455003885.207.211.1192.168.2.4
                                            Jan 15, 2025 15:40:54.981075048 CET50087445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:40:54.986041069 CET4455008785.207.211.2192.168.2.4
                                            Jan 15, 2025 15:40:54.986141920 CET50087445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:40:54.986205101 CET50087445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:40:54.986609936 CET50088445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:40:54.991354942 CET4455008785.207.211.2192.168.2.4
                                            Jan 15, 2025 15:40:54.991420031 CET50087445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:40:54.992459059 CET4455008885.207.211.2192.168.2.4
                                            Jan 15, 2025 15:40:54.992542028 CET50088445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:40:54.992578030 CET50088445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:40:54.997286081 CET4455008885.207.211.2192.168.2.4
                                            Jan 15, 2025 15:40:55.325297117 CET50089445192.168.2.4221.134.212.57
                                            Jan 15, 2025 15:40:55.331098080 CET44550089221.134.212.57192.168.2.4
                                            Jan 15, 2025 15:40:55.331302881 CET50089445192.168.2.4221.134.212.57
                                            Jan 15, 2025 15:40:55.331424952 CET50089445192.168.2.4221.134.212.57
                                            Jan 15, 2025 15:40:55.331729889 CET50090445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:40:55.336296082 CET44550089221.134.212.57192.168.2.4
                                            Jan 15, 2025 15:40:55.336436033 CET50089445192.168.2.4221.134.212.57
                                            Jan 15, 2025 15:40:55.338962078 CET44550090221.134.212.1192.168.2.4
                                            Jan 15, 2025 15:40:55.339046955 CET50090445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:40:55.339095116 CET50090445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:40:55.339498997 CET50091445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:40:55.344099045 CET44550090221.134.212.1192.168.2.4
                                            Jan 15, 2025 15:40:55.344151974 CET50090445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:40:55.344240904 CET44550091221.134.212.1192.168.2.4
                                            Jan 15, 2025 15:40:55.344322920 CET50091445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:40:55.344341040 CET50091445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:40:55.349071980 CET44550091221.134.212.1192.168.2.4
                                            Jan 15, 2025 15:40:55.668436050 CET50092445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:55.673563957 CET44550092163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:55.673644066 CET50092445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:55.673687935 CET50092445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:40:55.678509951 CET44550092163.46.23.1192.168.2.4
                                            Jan 15, 2025 15:40:56.403379917 CET50093445192.168.2.47.211.44.86
                                            Jan 15, 2025 15:40:56.408169031 CET445500937.211.44.86192.168.2.4
                                            Jan 15, 2025 15:40:56.408272982 CET50093445192.168.2.47.211.44.86
                                            Jan 15, 2025 15:40:56.408303976 CET50093445192.168.2.47.211.44.86
                                            Jan 15, 2025 15:40:56.408477068 CET50094445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:40:56.413276911 CET445500947.211.44.1192.168.2.4
                                            Jan 15, 2025 15:40:56.413325071 CET50094445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:40:56.413357019 CET50094445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:40:56.413790941 CET445500937.211.44.86192.168.2.4
                                            Jan 15, 2025 15:40:56.413821936 CET50095445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:40:56.413832903 CET50093445192.168.2.47.211.44.86
                                            Jan 15, 2025 15:40:56.418252945 CET445500947.211.44.1192.168.2.4
                                            Jan 15, 2025 15:40:56.418339968 CET50094445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:40:56.418787003 CET445500957.211.44.1192.168.2.4
                                            Jan 15, 2025 15:40:56.418843985 CET50095445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:40:56.418976068 CET50095445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:40:56.423702955 CET445500957.211.44.1192.168.2.4
                                            Jan 15, 2025 15:40:56.703299046 CET4455004210.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:56.703386068 CET50042445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:56.703417063 CET50042445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:56.703455925 CET50042445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:56.708206892 CET4455004210.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:56.708348989 CET4455004210.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:56.918713093 CET4455004375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:56.918791056 CET50043445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:56.918848038 CET50043445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:56.918941975 CET50043445192.168.2.475.40.242.1
                                            Jan 15, 2025 15:40:56.923688889 CET4455004375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:56.923845053 CET4455004375.40.242.1192.168.2.4
                                            Jan 15, 2025 15:40:56.981344938 CET50096445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:40:56.986268997 CET4455009675.40.242.2192.168.2.4
                                            Jan 15, 2025 15:40:56.986440897 CET50096445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:40:56.986483097 CET50096445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:40:56.986958027 CET50097445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:40:56.991352081 CET4455009675.40.242.2192.168.2.4
                                            Jan 15, 2025 15:40:56.991602898 CET4455009675.40.242.2192.168.2.4
                                            Jan 15, 2025 15:40:56.991671085 CET50096445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:40:56.991735935 CET4455009775.40.242.2192.168.2.4
                                            Jan 15, 2025 15:40:56.991799116 CET50097445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:40:56.991985083 CET50097445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:40:56.996753931 CET4455009775.40.242.2192.168.2.4
                                            Jan 15, 2025 15:40:57.420025110 CET50098445192.168.2.413.201.100.218
                                            Jan 15, 2025 15:40:57.424988985 CET4455009813.201.100.218192.168.2.4
                                            Jan 15, 2025 15:40:57.425066948 CET50098445192.168.2.413.201.100.218
                                            Jan 15, 2025 15:40:57.425144911 CET50098445192.168.2.413.201.100.218
                                            Jan 15, 2025 15:40:57.425280094 CET50099445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:40:57.430083036 CET4455009913.201.100.1192.168.2.4
                                            Jan 15, 2025 15:40:57.430144072 CET50099445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:40:57.430211067 CET50099445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:40:57.431108952 CET4455009813.201.100.218192.168.2.4
                                            Jan 15, 2025 15:40:57.431162119 CET50098445192.168.2.413.201.100.218
                                            Jan 15, 2025 15:40:57.432588100 CET50100445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:40:57.435281038 CET4455009913.201.100.1192.168.2.4
                                            Jan 15, 2025 15:40:57.435326099 CET50099445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:40:57.437472105 CET4455010013.201.100.1192.168.2.4
                                            Jan 15, 2025 15:40:57.437542915 CET50100445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:40:57.437572002 CET50100445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:40:57.442394972 CET4455010013.201.100.1192.168.2.4
                                            Jan 15, 2025 15:40:57.715362072 CET50102445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:57.721452951 CET4455010256.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:57.721549988 CET50102445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:57.721579075 CET50102445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:40:57.727781057 CET4455010256.131.124.1192.168.2.4
                                            Jan 15, 2025 15:40:58.356213093 CET50104445192.168.2.45.179.105.228
                                            Jan 15, 2025 15:40:58.360996962 CET445501045.179.105.228192.168.2.4
                                            Jan 15, 2025 15:40:58.361072063 CET50104445192.168.2.45.179.105.228
                                            Jan 15, 2025 15:40:58.361118078 CET50104445192.168.2.45.179.105.228
                                            Jan 15, 2025 15:40:58.361335993 CET50105445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:40:58.366163015 CET445501045.179.105.228192.168.2.4
                                            Jan 15, 2025 15:40:58.366229057 CET445501055.179.105.1192.168.2.4
                                            Jan 15, 2025 15:40:58.366247892 CET50104445192.168.2.45.179.105.228
                                            Jan 15, 2025 15:40:58.366281986 CET50105445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:40:58.366355896 CET50105445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:40:58.366570950 CET50106445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:40:58.371223927 CET445501055.179.105.1192.168.2.4
                                            Jan 15, 2025 15:40:58.371279001 CET50105445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:40:58.371356010 CET445501065.179.105.1192.168.2.4
                                            Jan 15, 2025 15:40:58.371408939 CET50106445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:40:58.371453047 CET50106445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:40:58.376183987 CET445501065.179.105.1192.168.2.4
                                            Jan 15, 2025 15:40:58.719639063 CET44550046126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:40:58.719754934 CET50046445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:58.719799995 CET50046445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:58.719826937 CET50046445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:40:58.724601030 CET44550046126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:40:58.724662066 CET44550046126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:40:58.933610916 CET4455004743.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:58.933705091 CET50047445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:58.933813095 CET50047445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:58.933999062 CET50047445192.168.2.443.95.77.1
                                            Jan 15, 2025 15:40:58.938644886 CET4455004743.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:58.938822031 CET4455004743.95.77.1192.168.2.4
                                            Jan 15, 2025 15:40:58.996877909 CET50112445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:40:59.002295971 CET4455011243.95.77.2192.168.2.4
                                            Jan 15, 2025 15:40:59.002589941 CET50112445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:40:59.002589941 CET50112445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:40:59.002932072 CET50113445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:40:59.007828951 CET4455011243.95.77.2192.168.2.4
                                            Jan 15, 2025 15:40:59.007865906 CET4455011343.95.77.2192.168.2.4
                                            Jan 15, 2025 15:40:59.007926941 CET50112445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:40:59.007989883 CET50113445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:40:59.008039951 CET50113445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:40:59.012870073 CET4455011343.95.77.2192.168.2.4
                                            Jan 15, 2025 15:40:59.233422995 CET50114445192.168.2.4148.245.140.156
                                            Jan 15, 2025 15:40:59.238302946 CET44550114148.245.140.156192.168.2.4
                                            Jan 15, 2025 15:40:59.238378048 CET50114445192.168.2.4148.245.140.156
                                            Jan 15, 2025 15:40:59.238399982 CET50114445192.168.2.4148.245.140.156
                                            Jan 15, 2025 15:40:59.238557100 CET50115445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:40:59.243310928 CET44550114148.245.140.156192.168.2.4
                                            Jan 15, 2025 15:40:59.243401051 CET44550114148.245.140.156192.168.2.4
                                            Jan 15, 2025 15:40:59.243411064 CET44550115148.245.140.1192.168.2.4
                                            Jan 15, 2025 15:40:59.243439913 CET50114445192.168.2.4148.245.140.156
                                            Jan 15, 2025 15:40:59.243493080 CET50115445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:40:59.243568897 CET50115445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:40:59.243961096 CET50116445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:40:59.248377085 CET44550115148.245.140.1192.168.2.4
                                            Jan 15, 2025 15:40:59.248421907 CET50115445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:40:59.248691082 CET44550116148.245.140.1192.168.2.4
                                            Jan 15, 2025 15:40:59.248742104 CET50116445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:40:59.248800039 CET50116445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:40:59.253520966 CET44550116148.245.140.1192.168.2.4
                                            Jan 15, 2025 15:40:59.715508938 CET50122445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:59.720423937 CET4455012210.10.127.1192.168.2.4
                                            Jan 15, 2025 15:40:59.720535994 CET50122445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:59.720535994 CET50122445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:40:59.725327969 CET4455012210.10.127.1192.168.2.4
                                            Jan 15, 2025 15:41:00.059779882 CET50123445192.168.2.49.190.114.97
                                            Jan 15, 2025 15:41:00.064608097 CET445501239.190.114.97192.168.2.4
                                            Jan 15, 2025 15:41:00.064718008 CET50123445192.168.2.49.190.114.97
                                            Jan 15, 2025 15:41:00.067429066 CET50123445192.168.2.49.190.114.97
                                            Jan 15, 2025 15:41:00.067605019 CET50124445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:00.072315931 CET445501239.190.114.97192.168.2.4
                                            Jan 15, 2025 15:41:00.072379112 CET50123445192.168.2.49.190.114.97
                                            Jan 15, 2025 15:41:00.072396994 CET445501249.190.114.1192.168.2.4
                                            Jan 15, 2025 15:41:00.072478056 CET50124445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:00.072506905 CET50124445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:00.072788954 CET50125445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:00.077466011 CET445501249.190.114.1192.168.2.4
                                            Jan 15, 2025 15:41:00.077584028 CET445501259.190.114.1192.168.2.4
                                            Jan 15, 2025 15:41:00.077615976 CET50124445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:00.077660084 CET50125445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:00.077696085 CET50125445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:00.082468033 CET445501259.190.114.1192.168.2.4
                                            Jan 15, 2025 15:41:00.731899977 CET44550050135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:41:00.732966900 CET50050445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:41:00.733031034 CET50050445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:41:00.733135939 CET50050445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:41:00.737826109 CET44550050135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:41:00.737879992 CET44550050135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:41:00.825037956 CET50131445192.168.2.4158.253.134.29
                                            Jan 15, 2025 15:41:00.830640078 CET44550131158.253.134.29192.168.2.4
                                            Jan 15, 2025 15:41:00.830727100 CET50131445192.168.2.4158.253.134.29
                                            Jan 15, 2025 15:41:00.830801010 CET50131445192.168.2.4158.253.134.29
                                            Jan 15, 2025 15:41:00.830919027 CET50132445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:00.836441994 CET44550132158.253.134.1192.168.2.4
                                            Jan 15, 2025 15:41:00.836545944 CET50132445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:00.836612940 CET50132445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:00.836884975 CET44550131158.253.134.29192.168.2.4
                                            Jan 15, 2025 15:41:00.836937904 CET50133445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:00.837011099 CET50131445192.168.2.4158.253.134.29
                                            Jan 15, 2025 15:41:00.842221022 CET44550132158.253.134.1192.168.2.4
                                            Jan 15, 2025 15:41:00.842278957 CET50132445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:00.842355967 CET44550133158.253.134.1192.168.2.4
                                            Jan 15, 2025 15:41:00.842413902 CET50133445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:00.842427015 CET50133445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:00.847985983 CET44550133158.253.134.1192.168.2.4
                                            Jan 15, 2025 15:41:00.964745045 CET4455005120.119.231.1192.168.2.4
                                            Jan 15, 2025 15:41:00.964843035 CET50051445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:41:00.964904070 CET50051445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:41:00.964997053 CET50051445192.168.2.420.119.231.1
                                            Jan 15, 2025 15:41:00.971632004 CET4455005120.119.231.1192.168.2.4
                                            Jan 15, 2025 15:41:00.971646070 CET4455005120.119.231.1192.168.2.4
                                            Jan 15, 2025 15:41:01.028126955 CET50139445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:01.034320116 CET4455013920.119.231.2192.168.2.4
                                            Jan 15, 2025 15:41:01.034408092 CET50139445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:01.034435034 CET50139445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:01.034790039 CET50140445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:01.041505098 CET4455014020.119.231.2192.168.2.4
                                            Jan 15, 2025 15:41:01.041568995 CET50140445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:01.041598082 CET50140445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:01.041606903 CET4455013920.119.231.2192.168.2.4
                                            Jan 15, 2025 15:41:01.041661978 CET50139445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:01.048660040 CET4455014020.119.231.2192.168.2.4
                                            Jan 15, 2025 15:41:01.731129885 CET50146445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:41:01.736638069 CET44550146126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:41:01.736707926 CET50146445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:41:01.736741066 CET50146445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:41:01.744422913 CET44550146126.222.69.1192.168.2.4
                                            Jan 15, 2025 15:41:02.746337891 CET4455005479.143.219.1192.168.2.4
                                            Jan 15, 2025 15:41:02.746572018 CET50054445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:02.746618986 CET50054445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:02.746618986 CET50054445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:02.751413107 CET4455005479.143.219.1192.168.2.4
                                            Jan 15, 2025 15:41:02.751432896 CET4455005479.143.219.1192.168.2.4
                                            Jan 15, 2025 15:41:02.932934046 CET4455005534.70.129.1192.168.2.4
                                            Jan 15, 2025 15:41:02.933059931 CET50055445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:41:02.933060884 CET50055445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:41:02.933136940 CET50055445192.168.2.434.70.129.1
                                            Jan 15, 2025 15:41:02.937939882 CET4455005534.70.129.1192.168.2.4
                                            Jan 15, 2025 15:41:02.937956095 CET4455005534.70.129.1192.168.2.4
                                            Jan 15, 2025 15:41:02.996756077 CET50156445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:03.001878023 CET4455015634.70.129.2192.168.2.4
                                            Jan 15, 2025 15:41:03.002008915 CET50156445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:03.002052069 CET50156445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:03.002446890 CET50157445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:03.007303953 CET4455015634.70.129.2192.168.2.4
                                            Jan 15, 2025 15:41:03.007369041 CET4455015734.70.129.2192.168.2.4
                                            Jan 15, 2025 15:41:03.007385015 CET50156445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:03.007424116 CET50157445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:03.007453918 CET50157445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:03.012320042 CET4455015734.70.129.2192.168.2.4
                                            Jan 15, 2025 15:41:03.746692896 CET50165445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:41:03.751472950 CET44550165135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:41:03.752976894 CET50165445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:41:03.752996922 CET50165445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:41:03.757746935 CET44550165135.243.33.1192.168.2.4
                                            Jan 15, 2025 15:41:05.622888088 CET44550057165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:41:05.622999907 CET50057445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:41:05.623172998 CET50057445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:41:05.623172998 CET50057445192.168.2.4165.109.216.1
                                            Jan 15, 2025 15:41:05.627974987 CET44550057165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:41:05.627990961 CET44550057165.109.216.1192.168.2.4
                                            Jan 15, 2025 15:41:05.652422905 CET4455005994.240.109.1192.168.2.4
                                            Jan 15, 2025 15:41:05.652693033 CET50059445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:41:05.652777910 CET50059445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:41:05.652831078 CET50059445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:41:05.657587051 CET4455005994.240.109.1192.168.2.4
                                            Jan 15, 2025 15:41:05.657617092 CET4455005994.240.109.1192.168.2.4
                                            Jan 15, 2025 15:41:05.684144974 CET50194445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:05.689069033 CET44550194165.109.216.2192.168.2.4
                                            Jan 15, 2025 15:41:05.689147949 CET50194445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:05.689232111 CET50194445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:05.689568996 CET50195445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:05.694055080 CET44550194165.109.216.2192.168.2.4
                                            Jan 15, 2025 15:41:05.694118023 CET50194445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:05.694396019 CET44550195165.109.216.2192.168.2.4
                                            Jan 15, 2025 15:41:05.694453001 CET50195445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:05.694498062 CET50195445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:05.699228048 CET44550195165.109.216.2192.168.2.4
                                            Jan 15, 2025 15:41:05.762340069 CET50196445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:06.777673960 CET50196445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:06.782274961 CET44550062139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:41:06.782376051 CET50062445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:41:06.782475948 CET50062445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:41:06.782475948 CET50062445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:41:06.783222914 CET4455019679.143.219.1192.168.2.4
                                            Jan 15, 2025 15:41:06.783243895 CET4455019679.143.219.1192.168.2.4
                                            Jan 15, 2025 15:41:06.783337116 CET50196445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:06.783390045 CET50196445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:06.783390045 CET50196445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:06.791883945 CET44550062139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:41:06.791904926 CET44550062139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:41:06.791925907 CET4455019679.143.219.1192.168.2.4
                                            Jan 15, 2025 15:41:06.951293945 CET44550063111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:41:06.951518059 CET50063445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:41:06.951518059 CET50063445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:41:06.951518059 CET50063445192.168.2.4111.199.171.1
                                            Jan 15, 2025 15:41:06.956545115 CET44550063111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:41:06.956578016 CET44550063111.199.171.1192.168.2.4
                                            Jan 15, 2025 15:41:07.012207031 CET50211445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:07.017286062 CET44550211111.199.171.2192.168.2.4
                                            Jan 15, 2025 15:41:07.017357111 CET50211445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:07.017460108 CET50211445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:07.018126011 CET50212445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:07.022432089 CET44550211111.199.171.2192.168.2.4
                                            Jan 15, 2025 15:41:07.022485971 CET50211445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:07.022972107 CET44550212111.199.171.2192.168.2.4
                                            Jan 15, 2025 15:41:07.023036003 CET50212445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:07.023070097 CET50212445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:07.027831078 CET44550212111.199.171.2192.168.2.4
                                            Jan 15, 2025 15:41:08.669030905 CET50247445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:41:08.673944950 CET4455024794.240.109.1192.168.2.4
                                            Jan 15, 2025 15:41:08.674036980 CET50247445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:41:08.674071074 CET50247445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:41:08.678896904 CET4455024794.240.109.1192.168.2.4
                                            Jan 15, 2025 15:41:08.964745998 CET4455006576.71.199.1192.168.2.4
                                            Jan 15, 2025 15:41:08.964864969 CET50065445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:41:08.964909077 CET50065445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:41:08.964934111 CET50065445192.168.2.476.71.199.1
                                            Jan 15, 2025 15:41:08.969655991 CET4455006576.71.199.1192.168.2.4
                                            Jan 15, 2025 15:41:08.969845057 CET4455006576.71.199.1192.168.2.4
                                            Jan 15, 2025 15:41:09.027847052 CET50260445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:09.032622099 CET4455026076.71.199.2192.168.2.4
                                            Jan 15, 2025 15:41:09.032722950 CET50260445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:09.036462069 CET50260445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:09.036782026 CET50261445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:09.041260004 CET4455026076.71.199.2192.168.2.4
                                            Jan 15, 2025 15:41:09.041325092 CET50260445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:09.041639090 CET4455026176.71.199.2192.168.2.4
                                            Jan 15, 2025 15:41:09.041702986 CET50261445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:09.041831017 CET50261445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:09.046637058 CET4455026176.71.199.2192.168.2.4
                                            Jan 15, 2025 15:41:09.517257929 CET4455006876.16.231.1192.168.2.4
                                            Jan 15, 2025 15:41:09.517316103 CET50068445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:41:09.517368078 CET50068445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:41:09.517426014 CET50068445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:41:09.522203922 CET4455006876.16.231.1192.168.2.4
                                            Jan 15, 2025 15:41:09.522248983 CET4455006876.16.231.1192.168.2.4
                                            Jan 15, 2025 15:41:09.793457985 CET50282445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:41:09.798326015 CET44550282139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:41:09.798418999 CET50282445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:41:09.798446894 CET50282445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:41:09.803245068 CET44550282139.184.56.1192.168.2.4
                                            Jan 15, 2025 15:41:10.046794891 CET44550071223.125.161.1192.168.2.4
                                            Jan 15, 2025 15:41:10.046900034 CET50071445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:41:10.046900988 CET50071445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:41:10.046986103 CET50071445192.168.2.4223.125.161.1
                                            Jan 15, 2025 15:41:10.051775932 CET44550071223.125.161.1192.168.2.4
                                            Jan 15, 2025 15:41:10.051791906 CET44550071223.125.161.1192.168.2.4
                                            Jan 15, 2025 15:41:11.033360004 CET4455007232.41.128.1192.168.2.4
                                            Jan 15, 2025 15:41:11.033454895 CET50072445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:41:11.033480883 CET50072445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:41:11.033510923 CET50072445192.168.2.432.41.128.1
                                            Jan 15, 2025 15:41:11.039447069 CET4455007232.41.128.1192.168.2.4
                                            Jan 15, 2025 15:41:11.039522886 CET4455007232.41.128.1192.168.2.4
                                            Jan 15, 2025 15:41:11.090816975 CET50332445192.168.2.432.41.128.2
                                            Jan 15, 2025 15:41:11.095783949 CET4455033232.41.128.2192.168.2.4
                                            Jan 15, 2025 15:41:11.095890999 CET50332445192.168.2.432.41.128.2
                                            Jan 15, 2025 15:41:11.100740910 CET50332445192.168.2.432.41.128.2
                                            Jan 15, 2025 15:41:11.101185083 CET50334445192.168.2.432.41.128.2
                                            Jan 15, 2025 15:41:11.105598927 CET4455033232.41.128.2192.168.2.4
                                            Jan 15, 2025 15:41:11.105667114 CET50332445192.168.2.432.41.128.2
                                            Jan 15, 2025 15:41:11.105998039 CET4455033432.41.128.2192.168.2.4
                                            Jan 15, 2025 15:41:11.106066942 CET50334445192.168.2.432.41.128.2
                                            Jan 15, 2025 15:41:11.106123924 CET50334445192.168.2.432.41.128.2
                                            Jan 15, 2025 15:41:11.110876083 CET4455033432.41.128.2192.168.2.4
                                            Jan 15, 2025 15:41:11.542907000 CET44550075205.104.64.1192.168.2.4
                                            Jan 15, 2025 15:41:11.543082952 CET50075445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:41:11.543174982 CET50075445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:41:11.543174982 CET50075445192.168.2.4205.104.64.1
                                            Jan 15, 2025 15:41:11.548429966 CET44550075205.104.64.1192.168.2.4
                                            Jan 15, 2025 15:41:11.548470974 CET44550075205.104.64.1192.168.2.4
                                            Jan 15, 2025 15:41:12.527861118 CET50454445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:41:12.532790899 CET4455045476.16.231.1192.168.2.4
                                            Jan 15, 2025 15:41:12.532958984 CET50454445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:41:12.532994032 CET50454445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:41:12.537857056 CET4455045476.16.231.1192.168.2.4
                                            Jan 15, 2025 15:41:12.982767105 CET4455007852.127.103.1192.168.2.4
                                            Jan 15, 2025 15:41:12.982831955 CET50078445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:41:13.017828941 CET44550079183.201.58.1192.168.2.4
                                            Jan 15, 2025 15:41:13.017874002 CET50079445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:41:13.177653074 CET50157445192.168.2.434.70.129.2
                                            Jan 15, 2025 15:41:13.177689075 CET50116445192.168.2.4148.245.140.1
                                            Jan 15, 2025 15:41:13.177783012 CET50083445192.168.2.4150.113.209.1
                                            Jan 15, 2025 15:41:13.177819014 CET50097445192.168.2.475.40.242.2
                                            Jan 15, 2025 15:41:13.177826881 CET50196445192.168.2.479.143.219.1
                                            Jan 15, 2025 15:41:13.177887917 CET50078445192.168.2.452.127.103.1
                                            Jan 15, 2025 15:41:13.177923918 CET50079445192.168.2.4183.201.58.1
                                            Jan 15, 2025 15:41:13.177973032 CET50082445192.168.2.4219.171.12.1
                                            Jan 15, 2025 15:41:13.177989006 CET50086445192.168.2.468.7.6.1
                                            Jan 15, 2025 15:41:13.178033113 CET50088445192.168.2.485.207.211.2
                                            Jan 15, 2025 15:41:13.178034067 CET50091445192.168.2.4221.134.212.1
                                            Jan 15, 2025 15:41:13.178046942 CET50092445192.168.2.4163.46.23.1
                                            Jan 15, 2025 15:41:13.178070068 CET50095445192.168.2.47.211.44.1
                                            Jan 15, 2025 15:41:13.178092957 CET50100445192.168.2.413.201.100.1
                                            Jan 15, 2025 15:41:13.178116083 CET50102445192.168.2.456.131.124.1
                                            Jan 15, 2025 15:41:13.178133965 CET50106445192.168.2.45.179.105.1
                                            Jan 15, 2025 15:41:13.178150892 CET50113445192.168.2.443.95.77.2
                                            Jan 15, 2025 15:41:13.178177118 CET50122445192.168.2.410.10.127.1
                                            Jan 15, 2025 15:41:13.178204060 CET50125445192.168.2.49.190.114.1
                                            Jan 15, 2025 15:41:13.178231955 CET50133445192.168.2.4158.253.134.1
                                            Jan 15, 2025 15:41:13.178250074 CET50140445192.168.2.420.119.231.2
                                            Jan 15, 2025 15:41:13.178267002 CET50146445192.168.2.4126.222.69.1
                                            Jan 15, 2025 15:41:13.178294897 CET50165445192.168.2.4135.243.33.1
                                            Jan 15, 2025 15:41:13.178323030 CET50195445192.168.2.4165.109.216.2
                                            Jan 15, 2025 15:41:13.178348064 CET50212445192.168.2.4111.199.171.2
                                            Jan 15, 2025 15:41:13.178369999 CET50261445192.168.2.476.71.199.2
                                            Jan 15, 2025 15:41:13.178436995 CET50247445192.168.2.494.240.109.1
                                            Jan 15, 2025 15:41:13.178457022 CET50282445192.168.2.4139.184.56.1
                                            Jan 15, 2025 15:41:13.178484917 CET50454445192.168.2.476.16.231.1
                                            Jan 15, 2025 15:41:13.178560019 CET50334445192.168.2.432.41.128.2
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 15, 2025 15:40:05.834939003 CET5964553192.168.2.41.1.1.1
                                            Jan 15, 2025 15:40:06.155663013 CET53596451.1.1.1192.168.2.4
                                            Jan 15, 2025 15:40:06.790016890 CET5834153192.168.2.41.1.1.1
                                            Jan 15, 2025 15:40:07.118252039 CET53583411.1.1.1192.168.2.4
                                            Jan 15, 2025 15:40:21.550074100 CET138138192.168.2.4192.168.2.255
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jan 15, 2025 15:40:05.834939003 CET192.168.2.41.1.1.10x18bcStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                            Jan 15, 2025 15:40:06.790016890 CET192.168.2.41.1.1.10x30b2Standard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 15, 2025 15:40:06.155663013 CET1.1.1.1192.168.2.40x18bcNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                            Jan 15, 2025 15:40:07.118252039 CET1.1.1.1192.168.2.40x30b2No error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                            Jan 15, 2025 15:40:07.118252039 CET1.1.1.1192.168.2.40x30b2No error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449730103.224.212.215803164C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 15:40:06.166840076 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 15:40:06.783262968 CET365INHTTP/1.1 302 Found
                                            date: Wed, 15 Jan 2025 14:40:06 GMT
                                            server: Apache
                                            set-cookie: __tad=1736952006.1100515; expires=Sat, 13-Jan-2035 14:40:06 GMT; Max-Age=315360000
                                            location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0612-9098-d266b9c3156a
                                            content-length: 2
                                            content-type: text/html; charset=UTF-8
                                            connection: close
                                            Data Raw: 0a 0a
                                            Data Ascii:


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.449731199.59.243.228803164C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 15:40:07.126353979 CET169OUTGET /?subid1=20250116-0140-0612-9098-d266b9c3156a HTTP/1.1
                                            Cache-Control: no-cache
                                            Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Connection: Keep-Alive
                                            Jan 15, 2025 15:40:07.600953102 CET1236INHTTP/1.1 200 OK
                                            date: Wed, 15 Jan 2025 14:40:06 GMT
                                            content-type: text/html; charset=utf-8
                                            content-length: 1262
                                            x-request-id: 04768f6c-8dd5-4f0d-884c-dbdf53d063e1
                                            cache-control: no-store, max-age=0
                                            accept-ch: sec-ch-prefers-color-scheme
                                            critical-ch: sec-ch-prefers-color-scheme
                                            vary: sec-ch-prefers-color-scheme
                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Nqk8KcWpdBoifOuGjXGbpqQ+LkZe4B54Erty17zpYFPmUvncuJQUwgoZuXVelTo9oq312vZtNX74W8JPgiVSxQ==
                                            set-cookie: parking_session=04768f6c-8dd5-4f0d-884c-dbdf53d063e1; expires=Wed, 15 Jan 2025 14:55:07 GMT; path=/
                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4e 71 6b 38 4b 63 57 70 64 42 6f 69 66 4f 75 47 6a 58 47 62 70 71 51 2b 4c 6b 5a 65 34 42 35 34 45 72 74 79 31 37 7a 70 59 46 50 6d 55 76 6e 63 75 4a 51 55 77 67 6f 5a 75 58 56 65 6c 54 6f 39 6f 71 33 31 32 76 5a 74 4e 58 37 34 57 38 4a 50 67 69 56 53 78 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Nqk8KcWpdBoifOuGjXGbpqQ+LkZe4B54Erty17zpYFPmUvncuJQUwgoZuXVelTo9oq312vZtNX74W8JPgiVSxQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                            Jan 15, 2025 15:40:07.600977898 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                            Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMDQ3NjhmNmMtOGRkNS00ZjBkLTg4NGMtZGJkZjUzZDA2M2UxIiwicGFnZV90aW1lIjoxNzM2OTUyMDA3LCJwYWdlX3VybCI6I


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.449732103.224.212.215802104C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 15:40:07.962021112 CET100OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Cache-Control: no-cache
                                            Jan 15, 2025 15:40:08.564173937 CET365INHTTP/1.1 302 Found
                                            date: Wed, 15 Jan 2025 14:40:08 GMT
                                            server: Apache
                                            set-cookie: __tad=1736952008.3381355; expires=Sat, 13-Jan-2035 14:40:08 GMT; Max-Age=315360000
                                            location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-08a2-bd71-14f1e6207580
                                            content-length: 2
                                            content-type: text/html; charset=UTF-8
                                            connection: close
                                            Data Raw: 0a 0a
                                            Data Ascii:


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.449733199.59.243.228802104C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 15:40:08.587573051 CET169OUTGET /?subid1=20250116-0140-08a2-bd71-14f1e6207580 HTTP/1.1
                                            Cache-Control: no-cache
                                            Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Connection: Keep-Alive
                                            Jan 15, 2025 15:40:09.060187101 CET1236INHTTP/1.1 200 OK
                                            date: Wed, 15 Jan 2025 14:40:08 GMT
                                            content-type: text/html; charset=utf-8
                                            content-length: 1262
                                            x-request-id: 4d08e4f5-eea1-494d-97b0-b49f09567c6a
                                            cache-control: no-store, max-age=0
                                            accept-ch: sec-ch-prefers-color-scheme
                                            critical-ch: sec-ch-prefers-color-scheme
                                            vary: sec-ch-prefers-color-scheme
                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ntlGgthpIWyWGP/tojemTbiAqhN8C5+L/hW3M+MrvQiv1V+e3PsT44DjQysChUmWX0gIATNIMsY9/tWaywDw3w==
                                            set-cookie: parking_session=4d08e4f5-eea1-494d-97b0-b49f09567c6a; expires=Wed, 15 Jan 2025 14:55:09 GMT; path=/
                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6e 74 6c 47 67 74 68 70 49 57 79 57 47 50 2f 74 6f 6a 65 6d 54 62 69 41 71 68 4e 38 43 35 2b 4c 2f 68 57 33 4d 2b 4d 72 76 51 69 76 31 56 2b 65 33 50 73 54 34 34 44 6a 51 79 73 43 68 55 6d 57 58 30 67 49 41 54 4e 49 4d 73 59 39 2f 74 57 61 79 77 44 77 33 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ntlGgthpIWyWGP/tojemTbiAqhN8C5+L/hW3M+MrvQiv1V+e3PsT44DjQysChUmWX0gIATNIMsY9/tWaywDw3w==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                            Jan 15, 2025 15:40:09.060208082 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                            Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNGQwOGU0ZjUtZWVhMS00OTRkLTk3YjAtYjQ5ZjA5NTY3YzZhIiwicGFnZV90aW1lIjoxNzM2OTUyMDA5LCJwYWdlX3VybCI6I


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.449734103.224.212.215806264C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 15:40:08.700165987 CET134OUTGET / HTTP/1.1
                                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Cache-Control: no-cache
                                            Cookie: __tad=1736952006.1100515
                                            Jan 15, 2025 15:40:09.316423893 CET269INHTTP/1.1 302 Found
                                            date: Wed, 15 Jan 2025 14:40:09 GMT
                                            server: Apache
                                            location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0140-0955-b54b-361d8820c336
                                            content-length: 2
                                            content-type: text/html; charset=UTF-8
                                            connection: close
                                            Data Raw: 0a 0a
                                            Data Ascii:


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.449742199.59.243.228806264C:\Windows\mssecsvr.exe
                                            TimestampBytes transferredDirectionData
                                            Jan 15, 2025 15:40:09.325578928 CET231OUTGET /?subid1=20250116-0140-0955-b54b-361d8820c336 HTTP/1.1
                                            Cache-Control: no-cache
                                            Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            Connection: Keep-Alive
                                            Cookie: parking_session=04768f6c-8dd5-4f0d-884c-dbdf53d063e1
                                            Jan 15, 2025 15:40:09.790345907 CET1236INHTTP/1.1 200 OK
                                            date: Wed, 15 Jan 2025 14:40:08 GMT
                                            content-type: text/html; charset=utf-8
                                            content-length: 1262
                                            x-request-id: 76133d54-1000-4f11-951e-e3a4e5b148e9
                                            cache-control: no-store, max-age=0
                                            accept-ch: sec-ch-prefers-color-scheme
                                            critical-ch: sec-ch-prefers-color-scheme
                                            vary: sec-ch-prefers-color-scheme
                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_JP8OuIA9xpHiNswGnuhaFf2yfASBTTszG5K/WBT8yaUNAGNM4Yg4pWBaEIZroRqSWILNVLwG41zydp9dCxFh0g==
                                            set-cookie: parking_session=04768f6c-8dd5-4f0d-884c-dbdf53d063e1; expires=Wed, 15 Jan 2025 14:55:09 GMT
                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4a 50 38 4f 75 49 41 39 78 70 48 69 4e 73 77 47 6e 75 68 61 46 66 32 79 66 41 53 42 54 54 73 7a 47 35 4b 2f 57 42 54 38 79 61 55 4e 41 47 4e 4d 34 59 67 34 70 57 42 61 45 49 5a 72 6f 52 71 53 57 49 4c 4e 56 4c 77 47 34 31 7a 79 64 70 39 64 43 78 46 68 30 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_JP8OuIA9xpHiNswGnuhaFf2yfASBTTszG5K/WBT8yaUNAGNM4Yg4pWBaEIZroRqSWILNVLwG41zydp9dCxFh0g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                            Jan 15, 2025 15:40:09.790370941 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                            Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMDQ3NjhmNmMtOGRkNS00ZjBkLTg4NGMtZGJkZjUzZDA2M2UxIiwicGFnZV90aW1lIjoxNzM2OTUyMDA5LCJwYWdlX3VybCI6Imh0dHA6L


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:09:40:04
                                            Start date:15/01/2025
                                            Path:C:\Windows\System32\loaddll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:loaddll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll"
                                            Imagebase:0xbb0000
                                            File size:126'464 bytes
                                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:1
                                            Start time:09:40:04
                                            Start date:15/01/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:09:40:04
                                            Start date:15/01/2025
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:09:40:04
                                            Start date:15/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\mLm1d1GV4R.dll,PlayGame
                                            Imagebase:0x5a0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:09:40:04
                                            Start date:15/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",#1
                                            Imagebase:0x5a0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:09:40:04
                                            Start date:15/01/2025
                                            Path:C:\Windows\mssecsvr.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvr.exe
                                            Imagebase:0x400000
                                            File size:2'281'472 bytes
                                            MD5 hash:E916117384C8250971067D18F2734F8B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1727467369.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1727598802.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1727598802.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvr.exe, Author: Joe Security
                                            • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (with the help of binar.ly)
                                            • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvr.exe, Author: Florian Roth (based on rule by US CERT)
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvr.exe, Author: us-cert code analysis team
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 100%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:6
                                            Start time:09:40:06
                                            Start date:15/01/2025
                                            Path:C:\Windows\mssecsvr.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                            Imagebase:0x400000
                                            File size:2'281'472 bytes
                                            MD5 hash:E916117384C8250971067D18F2734F8B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1747881309.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1748144714.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1748144714.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2397201765.000000000226E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2397201765.000000000226E000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2396969286.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2396969286.0000000001D54000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Target ID:7
                                            Start time:09:40:07
                                            Start date:15/01/2025
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\mLm1d1GV4R.dll",PlayGame
                                            Imagebase:0x5a0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:09:40:07
                                            Start date:15/01/2025
                                            Path:C:\Windows\mssecsvr.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\WINDOWS\mssecsvr.exe
                                            Imagebase:0x400000
                                            File size:2'281'472 bytes
                                            MD5 hash:E916117384C8250971067D18F2734F8B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1769263752.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1756428845.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1769427655.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1769427655.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1756535765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1756535765.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:71.7%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:63.2%
                                              Total number of Nodes:38
                                              Total number of Limit Nodes:9
                                              execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                              • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                              • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                              • CreateProcessA.KERNELBASE ref: 00407EE8
                                              • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                              • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1762085011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1762058548.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762108569.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762201548.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4281112323-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1762085011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1762058548.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762108569.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762201548.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1762085011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1762058548.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762108569.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762201548.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              • API String ID: 774561529-2614457033
                                              • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                              • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                              • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                              • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1762085011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1762058548.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762108569.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762201548.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                              • API String ID: 3340711343-2450984573
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1762085011.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000005.00000002.1762058548.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762108569.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762131330.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762201548.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000005.00000002.1762297906.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.1
                                              • API String ID: 4274534310-2839763450
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Execution Graph

                                              Execution Coverage:34.8%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:36
                                              Total number of Limit Nodes:2

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • __p___argc.MSVCRT ref: 004080A5
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2396242741.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2396229030.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396257583.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396325576.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396339860.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                              • String ID: mssecsvc2.1
                                              • API String ID: 4274534310-2839763450
                                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                              Control-flow Graph

                                              APIs
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                              Strings
                                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2396242741.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2396229030.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396257583.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396325576.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396339860.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                              • API String ID: 774561529-2614457033
                                              • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                              • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                              • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                              • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                              Control-flow Graph

                                              APIs
                                              • sprintf.MSVCRT ref: 00407C56
                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2396242741.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2396229030.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396257583.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396325576.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396339860.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                              • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                              • API String ID: 3340711343-2450984573
                                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                              • sprintf.MSVCRT ref: 00407E01
                                              • sprintf.MSVCRT ref: 00407E18
                                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2396242741.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2396229030.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396257583.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396325576.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396339860.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                              • API String ID: 4072214828-1507730452
                                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2396242741.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2396229030.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396257583.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396272065.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396311528.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396325576.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396339860.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2396424447.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59