Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zTrDsX9gXl.dll

Overview

General Information

Sample name:zTrDsX9gXl.dll
renamed because original name is a hash value
Original sample name:f26e3b32f48b724f1fc9473823af68a9.dll
Analysis ID:1592025
MD5:f26e3b32f48b724f1fc9473823af68a9
SHA1:43cfbc4f8a8cd1ea6416c4b1e3d163fd8d8bb1b1
SHA256:6f84d2b8719b64bc655d9f8b94b9c72500f3bd088838c223b4678d690cec2a49
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7276 cmdline: loaddll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7328 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7352 cmdline: rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvr.exe (PID: 7376 cmdline: C:\WINDOWS\mssecsvr.exe MD5: DE6BCE2486E432A4B5B864474C28115A)
    • rundll32.exe (PID: 7336 cmdline: rundll32.exe C:\Users\user\Desktop\zTrDsX9gXl.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7500 cmdline: rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 7516 cmdline: C:\WINDOWS\mssecsvr.exe MD5: DE6BCE2486E432A4B5B864474C28115A)
  • mssecsvr.exe (PID: 7464 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: DE6BCE2486E432A4B5B864474C28115A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
zTrDsX9gXl.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    zTrDsX9gXl.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    zTrDsX9gXl.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.1749587403.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000000.1724997765.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000005.00000000.1703910829.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                Click to see the 20 entries
                SourceRuleDescriptionAuthorStrings
                5.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xe8d8:$x3: tasksche.exe
                • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xe92c:$x5: WNcry@2ol7
                • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xe82c:$s3: cmd.exe /c "%s"
                5.0.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                8.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xe8d8:$x3: tasksche.exe
                • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xe92c:$x5: WNcry@2ol7
                • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xe82c:$s3: cmd.exe /c "%s"
                8.0.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                6.2.mssecsvr.exe.1ea6084.4.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                Click to see the 88 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T17:02:04.003257+010028033043Unknown Traffic192.168.2.449730103.224.212.21580TCP
                2025-01-15T17:02:05.681757+010028033043Unknown Traffic192.168.2.449732103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T17:02:02.999711+010028300181A Network Trojan was detected192.168.2.4605401.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: zTrDsX9gXl.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640a38Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf79Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a734Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a7Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf7910Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/HAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640aAvira URL Cloud: Label: malware
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 91%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 91%
                Source: zTrDsX9gXl.dllReversingLabs: Detection: 92%
                Source: zTrDsX9gXl.dllVirustotal: Detection: 93%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: zTrDsX9gXl.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: zTrDsX9gXl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.4:60540 -> 1.1.1.1:53
                Source: unknownNetwork traffic detected: IP country count 10
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0302-0391-8145-be822d640a38 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0302-05ad-88d9-dedd0360a734 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736956923.6688295
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0302-0618-947e-8a073fcf7910 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=db512008-65d2-448a-b6b1-ea5977f3e3e8
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49732 -> 103.224.212.215:80
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.220
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.220
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.220
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.220
                Source: unknownTCP traffic detected without corresponding DNS query: 23.77.54.1
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.226
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.226
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.226
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.226
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.73.1
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.108
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.108
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.108
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.1
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.108
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.1
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.1
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.1
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.1
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.1
                Source: unknownTCP traffic detected without corresponding DNS query: 145.201.0.1
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.154
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.154
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.154
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.1
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.154
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.1
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.1
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.1
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.1
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.1
                Source: unknownTCP traffic detected without corresponding DNS query: 47.77.228.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.185.47.189
                Source: unknownTCP traffic detected without corresponding DNS query: 115.185.47.189
                Source: unknownTCP traffic detected without corresponding DNS query: 115.185.47.189
                Source: unknownTCP traffic detected without corresponding DNS query: 115.185.47.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.185.47.189
                Source: unknownTCP traffic detected without corresponding DNS query: 115.185.47.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0302-0391-8145-be822d640a38 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0302-05ad-88d9-dedd0360a734 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736956923.6688295
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0302-0618-947e-8a073fcf7910 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=db512008-65d2-448a-b6b1-ea5977f3e3e8
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000005.00000002.1738611393.0000000000C29000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1738611393.0000000000C40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640a
                Source: mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000003.1732478639.0000000000B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a7
                Source: mssecsvr.exe, 00000008.00000002.1750269582.0000000000B2E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.1744892737.0000000000B5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf79
                Source: mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/H
                Source: mssecsvr.exe, 00000005.00000002.1738611393.0000000000C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.sK
                Source: zTrDsX9gXl.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000005.00000002.1738611393.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1738611393.0000000000C40000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1750269582.0000000000AF8000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1750269582.0000000000B2E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.1744892737.0000000000B5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000008.00000002.1750269582.0000000000AF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                Source: mssecsvr.exe, 00000008.00000002.1750269582.0000000000B2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/gB
                Source: mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/sX
                Source: mssecsvr.exe, 00000008.00000002.1750269582.0000000000B2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/z
                Source: mssecsvr.exe, 00000006.00000002.2374813983.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comckx

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: zTrDsX9gXl.dll, type: SAMPLE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1ed8128.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.23e6948.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.240996c.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1eb5104.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.23d78c8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.23e28e8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1ea6084.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1eb10a4.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.23e6948.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1eb5104.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.1749587403.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1724997765.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.1703910829.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1732224157.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2376217679.00000000023E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1725332071.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1732331074.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.1704036895.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2375884712.0000000001EB5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1749794760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7376, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7464, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7516, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                System Summary

                barindex
                Source: zTrDsX9gXl.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: zTrDsX9gXl.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1ea6084.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.23d78c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1ed8128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1ed8128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.240996c.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.240996c.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1ed8128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1ed8128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.23e6948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.23e6948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.23e6948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.240996c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.240996c.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1eb5104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1eb5104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.1eb5104.2.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.23d78c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.23d78c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.23e28e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.23e28e8.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1ea6084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1ea6084.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.1ea6084.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1eb10a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1eb10a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.23e6948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.23e6948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1eb5104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1eb5104.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2376217679.00000000023E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1725332071.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1732331074.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000000.1704036895.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2375884712.0000000001EB5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.1749794760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: Joe Sandbox ViewDropped File: C:\WINDOWS\qeriuwjhrf (copy) 96D7B2D83E30FED4EEC2CBF2E1FBE426DAD705F918AE8ABBDA0DB4B4AFB82865
                Source: Joe Sandbox ViewDropped File: C:\Windows\tasksche.exe 96D7B2D83E30FED4EEC2CBF2E1FBE426DAD705F918AE8ABBDA0DB4B4AFB82865
                Source: tasksche.exe.5.drStatic PE information: No import functions for PE file found
                Source: zTrDsX9gXl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: zTrDsX9gXl.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: zTrDsX9gXl.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1ea6084.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.23d78c8.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1ed8128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1ed8128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.240996c.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.240996c.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1ed8128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1ed8128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.23e6948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.23e6948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.23e6948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.240996c.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.240996c.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1eb5104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1eb5104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.1eb5104.2.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.23d78c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.23d78c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.23e28e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.23e28e8.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1ea6084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1ea6084.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.1ea6084.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1eb10a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1eb10a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.23e6948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.23e6948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1eb5104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1eb5104.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2376217679.00000000023E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1725332071.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1732331074.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000000.1704036895.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2375884712.0000000001EB5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.1749794760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: tasksche.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: tasksche.exe.5.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                Source: tasksche.exe.5.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                Source: tasksche.exe.5.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                Source: zTrDsX9gXl.dll, tasksche.exe.5.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7284:120:WilError_03
                Source: zTrDsX9gXl.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\zTrDsX9gXl.dll,PlayGame
                Source: zTrDsX9gXl.dllReversingLabs: Detection: 92%
                Source: zTrDsX9gXl.dllVirustotal: Detection: 93%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\zTrDsX9gXl.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\zTrDsX9gXl.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: zTrDsX9gXl.dllStatic file information: File size 5267459 > 1048576
                Source: zTrDsX9gXl.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: tasksche.exe.5.drStatic PE information: section name: .text entropy: 7.663042758896975

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exe TID: 7580Thread sleep count: 96 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7580Thread sleep time: -192000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7584Thread sleep count: 129 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7584Thread sleep count: 42 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7580Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvr.exe, 00000008.00000002.1750269582.0000000000AF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                Source: mssecsvr.exe, 00000005.00000002.1738611393.0000000000C58000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1738611393.0000000000C29000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2375316425.0000000000AE9000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2375316425.0000000000B1E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1750269582.0000000000B4F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvr.exe, 00000005.00000002.1738611393.0000000000C58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWy@E
                Source: mssecsvr.exe, 00000008.00000002.1750269582.0000000000AF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SeE
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1Jump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592025 Sample: zTrDsX9gXl.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 36 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->38 40 77026.bodis.com 2->40 48 Suricata IDS alerts for network traffic 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for URL or domain 2->52 54 7 other signatures 2->54 9 loaddll32.exe 1 2->9         started        11 mssecsvr.exe 12 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        18 cmd.exe 1 9->18         started        20 conhost.exe 9->20         started        22 rundll32.exe 1 9->22         started        42 192.168.2.102 unknown unknown 11->42 44 192.168.2.103 unknown unknown 11->44 46 98 other IPs or domains 11->46 56 Connects to many different private IPs via SMB (likely to spread or exploit) 11->56 58 Connects to many different private IPs (likely to spread or exploit) 11->58 signatures6 process7 signatures8 60 Drops executables to the windows directory (C:\Windows) and starts them 15->60 24 mssecsvr.exe 13 15->24         started        27 rundll32.exe 18->27         started        process9 file10 32 C:\WINDOWS\qeriuwjhrf (copy), PE32 24->32 dropped 29 mssecsvr.exe 13 27->29         started        process11 file12 34 C:\Windows\tasksche.exe, PE32 29->34 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                zTrDsX9gXl.dll92%ReversingLabsWin32.Ransomware.WannaCry
                zTrDsX9gXl.dll93%VirustotalBrowse
                zTrDsX9gXl.dll100%AviraTR/Ransom.Gen
                zTrDsX9gXl.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)91%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe91%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640a38100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf79100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a734100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a7100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf7910100%Avira URL Cloudmalware
                http://ww25.sK0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/H100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640a100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comckx0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    high
                    ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a734false
                      • Avira URL Cloud: malware
                      unknown
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf7910false
                      • Avira URL Cloud: malware
                      unknown
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640a38false
                      • Avira URL Cloud: malware
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf79mssecsvr.exe, 00000008.00000002.1750269582.0000000000B2E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.1744892737.0000000000B5B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a7mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000003.1732478639.0000000000B2D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comzTrDsX9gXl.dllfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/sXmssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://ww25.sKmssecsvr.exe, 00000005.00000002.1738611393.0000000000C58000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comckxmssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/gBmssecsvr.exe, 00000008.00000002.1750269582.0000000000B2E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/zmssecsvr.exe, 00000008.00000002.1750269582.0000000000B2E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Hmssecsvr.exe, 00000006.00000002.2375316425.0000000000AFC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000006.00000002.2374813983.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvr.exe, 00000008.00000002.1750269582.0000000000AF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640amssecsvr.exe, 00000005.00000002.1738611393.0000000000C29000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1738611393.0000000000C40000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      40.235.31.1
                                      unknownUnited States
                                      4249LILLY-ASUSfalse
                                      211.237.66.129
                                      unknownKorea Republic of
                                      10171SKTELINK-ASSKTelinkKRfalse
                                      23.77.54.1
                                      unknownUnited States
                                      16625AKAMAI-ASUSfalse
                                      23.77.54.2
                                      unknownUnited States
                                      16625AKAMAI-ASUSfalse
                                      24.5.32.1
                                      unknownUnited States
                                      7922COMCAST-7922USfalse
                                      169.137.120.210
                                      unknownUnited States
                                      13433COXNETUSfalse
                                      38.46.21.1
                                      unknownUnited States
                                      174COGENT-174USfalse
                                      38.46.21.2
                                      unknownUnited States
                                      174COGENT-174USfalse
                                      40.24.94.201
                                      unknownUnited States
                                      4249LILLY-ASUSfalse
                                      130.53.73.1
                                      unknownUnited States
                                      385AFCONC-BLOCK1-ASUSfalse
                                      145.201.0.108
                                      unknownNetherlands
                                      1101IP-EEND-ASIP-EENDBVNLfalse
                                      40.24.94.1
                                      unknownUnited States
                                      4249LILLY-ASUSfalse
                                      130.53.73.5
                                      unknownUnited States
                                      385AFCONC-BLOCK1-ASUSfalse
                                      156.251.148.1
                                      unknownSeychelles
                                      40065CNSERVERSUSfalse
                                      103.135.215.1
                                      unknownIndonesia
                                      138658ICOMMUNICATION-AS-APICommunicationBDfalse
                                      81.189.195.1
                                      unknownAustria
                                      8437UTA-ASATfalse
                                      116.97.98.1
                                      unknownViet Nam
                                      7552VIETEL-AS-APViettelGroupVNfalse
                                      66.28.85.150
                                      unknownUnited States
                                      14454PERIMETER-ESECURITYUSfalse
                                      184.47.24.152
                                      unknownUnited States
                                      5778CENTURYLINK-LEGACY-EMBARQ-RCMTUSfalse
                                      81.189.195.27
                                      unknownAustria
                                      8437UTA-ASATfalse
                                      119.163.139.1
                                      unknownChina
                                      4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                      91.148.191.1
                                      unknownBulgaria
                                      205085BG-NETPLUSONEBGfalse
                                      91.148.191.2
                                      unknownBulgaria
                                      205085BG-NETPLUSONEBGfalse
                                      108.104.123.1
                                      unknownUnited States
                                      10507SPCSUSfalse
                                      73.4.193.160
                                      unknownUnited States
                                      7922COMCAST-7922USfalse
                                      47.77.228.1
                                      unknownUnited States
                                      9500VODAFONE-TRANSIT-ASVodafoneNZLtdNZfalse
                                      47.77.228.2
                                      unknownUnited States
                                      9500VODAFONE-TRANSIT-ASVodafoneNZLtdNZfalse
                                      IP
                                      192.168.2.148
                                      192.168.2.149
                                      192.168.2.146
                                      192.168.2.147
                                      192.168.2.140
                                      192.168.2.141
                                      192.168.2.144
                                      192.168.2.145
                                      192.168.2.142
                                      192.168.2.143
                                      192.168.2.159
                                      192.168.2.157
                                      192.168.2.158
                                      192.168.2.151
                                      192.168.2.152
                                      192.168.2.150
                                      192.168.2.155
                                      192.168.2.156
                                      192.168.2.153
                                      192.168.2.154
                                      192.168.2.126
                                      192.168.2.247
                                      192.168.2.127
                                      192.168.2.248
                                      192.168.2.124
                                      192.168.2.245
                                      192.168.2.125
                                      192.168.2.246
                                      192.168.2.128
                                      192.168.2.249
                                      192.168.2.129
                                      192.168.2.240
                                      192.168.2.122
                                      192.168.2.243
                                      192.168.2.123
                                      192.168.2.244
                                      192.168.2.120
                                      192.168.2.241
                                      192.168.2.121
                                      192.168.2.242
                                      192.168.2.97
                                      192.168.2.137
                                      192.168.2.96
                                      192.168.2.138
                                      192.168.2.99
                                      192.168.2.135
                                      192.168.2.98
                                      192.168.2.136
                                      192.168.2.139
                                      192.168.2.250
                                      192.168.2.130
                                      192.168.2.251
                                      192.168.2.91
                                      192.168.2.90
                                      192.168.2.93
                                      192.168.2.133
                                      192.168.2.254
                                      192.168.2.92
                                      192.168.2.134
                                      192.168.2.95
                                      192.168.2.131
                                      192.168.2.252
                                      192.168.2.94
                                      192.168.2.132
                                      192.168.2.253
                                      192.168.2.104
                                      192.168.2.225
                                      192.168.2.105
                                      192.168.2.226
                                      192.168.2.102
                                      192.168.2.223
                                      192.168.2.103
                                      192.168.2.224
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1592025
                                      Start date and time:2025-01-15 17:01:08 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 35s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:12
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:zTrDsX9gXl.dll
                                      renamed because original name is a hash value
                                      Original Sample Name:f26e3b32f48b724f1fc9473823af68a9.dll
                                      Detection:MAL
                                      Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .dll
                                      • Stop behavior analysis, all processes terminated
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 217.20.57.19, 2.23.77.188, 20.109.210.53, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      11:02:04API Interceptor1x Sleep call for process: loaddll32.exe modified
                                      11:02:39API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      77026.bodis.commLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.commLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      sLlAsC4I5r.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      habHh1BC0L.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      AKAMAI-ASUSbot.x86.elfGet hashmaliciousUnknownBrowse
                                      • 23.39.183.209
                                      i486.elfGet hashmaliciousMiraiBrowse
                                      • 23.63.45.89
                                      xd.arm.elfGet hashmaliciousMiraiBrowse
                                      • 23.52.165.231
                                      L#U043e#U0430d#U0435r.exeGet hashmaliciousLummaCBrowse
                                      • 104.102.49.254
                                      MotivatedFunded.exeGet hashmaliciousLummaC StealerBrowse
                                      • 104.102.49.254
                                      arm4.elfGet hashmaliciousMiraiBrowse
                                      • 23.3.198.114
                                      https://drive.google.com/file/d/1dNrtjTqb59ZQTE3gUuVhSjEbFXuJRXW7/view?usp=sharing&ts=6786e61fGet hashmaliciousUnknownBrowse
                                      • 23.201.255.95
                                      178.215.238.129-x86-2025-01-15T04_59_51.elfGet hashmaliciousMiraiBrowse
                                      • 23.54.60.112
                                      00.ps1Get hashmaliciousPureCrypter, LummaC, LummaC StealerBrowse
                                      • 23.47.27.74
                                      00.ps1Get hashmaliciousPureCrypter, LummaC, LummaC StealerBrowse
                                      • 104.102.49.254
                                      SKTELINK-ASSKTelinkKRarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 210.111.155.232
                                      x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 211.39.58.94
                                      mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 211.39.58.91
                                      Josho.arm.elfGet hashmaliciousUnknownBrowse
                                      • 211.43.242.52
                                      sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 210.219.114.11
                                      fbot.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 211.39.24.246
                                      arm5.elfGet hashmaliciousUnknownBrowse
                                      • 211.39.24.245
                                      sora.arm7.elfGet hashmaliciousMiraiBrowse
                                      • 211.39.24.210
                                      wGkT1MeX0l.elfGet hashmaliciousMiraiBrowse
                                      • 210.219.114.35
                                      ls0PnGaKLG.elfGet hashmaliciousUnknownBrowse
                                      • 210.219.114.12
                                      LILLY-ASUSbot.spc.elfGet hashmaliciousUnknownBrowse
                                      • 43.78.95.198
                                      bot.arm5.elfGet hashmaliciousUnknownBrowse
                                      • 40.41.147.231
                                      bot.mips.elfGet hashmaliciousUnknownBrowse
                                      • 43.147.50.223
                                      bot.m68k.elfGet hashmaliciousUnknownBrowse
                                      • 43.56.116.219
                                      bot.sh4.elfGet hashmaliciousUnknownBrowse
                                      • 43.11.77.234
                                      bot.arm7.elfGet hashmaliciousMiraiBrowse
                                      • 40.49.125.48
                                      arm5.elfGet hashmaliciousMiraiBrowse
                                      • 42.130.115.41
                                      xd.sh4.elfGet hashmaliciousMiraiBrowse
                                      • 43.205.251.217
                                      sh4.elfGet hashmaliciousMiraiBrowse
                                      • 40.38.217.210
                                      xd.spc.elfGet hashmaliciousMiraiBrowse
                                      • 43.210.115.189
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\WINDOWS\qeriuwjhrf (copy)ViNIRfmQmE.dllGet hashmaliciousWannacryBrowse
                                        k999IY68oT.dllGet hashmaliciousWannacryBrowse
                                          UBpReASuEC.dllGet hashmaliciousWannacryBrowse
                                            2yQ8hmXyz0.dllGet hashmaliciousWannacryBrowse
                                              4Maoj78D1f.dllGet hashmaliciousWannacryBrowse
                                                9UxtlcUBmY.dllGet hashmaliciousWannacryBrowse
                                                  41ECj4EgTY.dllGet hashmaliciousWannacryBrowse
                                                    C:\Windows\tasksche.exeViNIRfmQmE.dllGet hashmaliciousWannacryBrowse
                                                      k999IY68oT.dllGet hashmaliciousWannacryBrowse
                                                        UBpReASuEC.dllGet hashmaliciousWannacryBrowse
                                                          2yQ8hmXyz0.dllGet hashmaliciousWannacryBrowse
                                                            4Maoj78D1f.dllGet hashmaliciousWannacryBrowse
                                                              9UxtlcUBmY.dllGet hashmaliciousWannacryBrowse
                                                                41ECj4EgTY.dllGet hashmaliciousWannacryBrowse
                                                                  Process:C:\Windows\mssecsvr.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):2061938
                                                                  Entropy (8bit):7.993464768178038
                                                                  Encrypted:true
                                                                  SSDEEP:49152:SEMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvm:ZPoBhz1aRxcSUDk36SAEdhvm
                                                                  MD5:A0D0B20286669B4664AE1AEFFAF07A88
                                                                  SHA1:28BCAFBD85E84479B575CC1F3C5B3C39875A3A5F
                                                                  SHA-256:96D7B2D83E30FED4EEC2CBF2E1FBE426DAD705F918AE8ABBDA0DB4B4AFB82865
                                                                  SHA-512:CFF6F64549B7E2961181A041ECBFBE9C90B6B9AAB970609785FCD8A6AD69BE9915B0A6F22C3481EA4E07DC8BE3E4591FB49C551ABC22CEDA2239935ADFEC0249
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 91%
                                                                  Joe Sandbox View:
                                                                  • Filename: ViNIRfmQmE.dll, Detection: malicious, Browse
                                                                  • Filename: k999IY68oT.dll, Detection: malicious, Browse
                                                                  • Filename: UBpReASuEC.dll, Detection: malicious, Browse
                                                                  • Filename: 2yQ8hmXyz0.dll, Detection: malicious, Browse
                                                                  • Filename: 4Maoj78D1f.dll, Detection: malicious, Browse
                                                                  • Filename: 9UxtlcUBmY.dll, Detection: malicious, Browse
                                                                  • Filename: 41ECj4EgTY.dll, Detection: malicious, Browse
                                                                  Reputation:low
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\mssecsvr.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):2061938
                                                                  Entropy (8bit):7.993464768178038
                                                                  Encrypted:true
                                                                  SSDEEP:49152:SEMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvm:ZPoBhz1aRxcSUDk36SAEdhvm
                                                                  MD5:A0D0B20286669B4664AE1AEFFAF07A88
                                                                  SHA1:28BCAFBD85E84479B575CC1F3C5B3C39875A3A5F
                                                                  SHA-256:96D7B2D83E30FED4EEC2CBF2E1FBE426DAD705F918AE8ABBDA0DB4B4AFB82865
                                                                  SHA-512:CFF6F64549B7E2961181A041ECBFBE9C90B6B9AAB970609785FCD8A6AD69BE9915B0A6F22C3481EA4E07DC8BE3E4591FB49C551ABC22CEDA2239935ADFEC0249
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                                                  • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 91%
                                                                  Joe Sandbox View:
                                                                  • Filename: ViNIRfmQmE.dll, Detection: malicious, Browse
                                                                  • Filename: k999IY68oT.dll, Detection: malicious, Browse
                                                                  • Filename: UBpReASuEC.dll, Detection: malicious, Browse
                                                                  • Filename: 2yQ8hmXyz0.dll, Detection: malicious, Browse
                                                                  • Filename: 4Maoj78D1f.dll, Detection: malicious, Browse
                                                                  • Filename: 9UxtlcUBmY.dll, Detection: malicious, Browse
                                                                  • Filename: 41ECj4EgTY.dll, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):6.4183021947308045
                                                                  TrID:
                                                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                                                  • DOS Executable Generic (2002/1) 0.20%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:zTrDsX9gXl.dll
                                                                  File size:5'267'459 bytes
                                                                  MD5:f26e3b32f48b724f1fc9473823af68a9
                                                                  SHA1:43cfbc4f8a8cd1ea6416c4b1e3d163fd8d8bb1b1
                                                                  SHA256:6f84d2b8719b64bc655d9f8b94b9c72500f3bd088838c223b4678d690cec2a49
                                                                  SHA512:2d86677ee4954634021d43fbf56dc9bca1057434d4d7ac1f1e5ef0872c7d5cc1dc3ceeddba4c2f4429c5417117a8f25cac1615533a53ac66d3bf57089770ef40
                                                                  SSDEEP:98304:nfPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:nfPe1Cxcxk3ZAEUadzR8yc4H
                                                                  TLSH:943633D4626C62FCF1440EF444778A1AB7B73C6D66FA4E1F97C086660D43B9BABC0A41
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                                  Icon Hash:7ae282899bbab082
                                                                  Entrypoint:0x100011e9
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x10000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                                  DLL Characteristics:
                                                                  Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                                  Instruction
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push ebx
                                                                  mov ebx, dword ptr [ebp+08h]
                                                                  push esi
                                                                  mov esi, dword ptr [ebp+0Ch]
                                                                  push edi
                                                                  mov edi, dword ptr [ebp+10h]
                                                                  test esi, esi
                                                                  jne 00007F8234B41F3Bh
                                                                  cmp dword ptr [10003140h], 00000000h
                                                                  jmp 00007F8234B41F58h
                                                                  cmp esi, 01h
                                                                  je 00007F8234B41F37h
                                                                  cmp esi, 02h
                                                                  jne 00007F8234B41F54h
                                                                  mov eax, dword ptr [10003150h]
                                                                  test eax, eax
                                                                  je 00007F8234B41F3Bh
                                                                  push edi
                                                                  push esi
                                                                  push ebx
                                                                  call eax
                                                                  test eax, eax
                                                                  je 00007F8234B41F3Eh
                                                                  push edi
                                                                  push esi
                                                                  push ebx
                                                                  call 00007F8234B41E4Ah
                                                                  test eax, eax
                                                                  jne 00007F8234B41F36h
                                                                  xor eax, eax
                                                                  jmp 00007F8234B41F80h
                                                                  push edi
                                                                  push esi
                                                                  push ebx
                                                                  call 00007F8234B41CFCh
                                                                  cmp esi, 01h
                                                                  mov dword ptr [ebp+0Ch], eax
                                                                  jne 00007F8234B41F3Eh
                                                                  test eax, eax
                                                                  jne 00007F8234B41F69h
                                                                  push edi
                                                                  push eax
                                                                  push ebx
                                                                  call 00007F8234B41E26h
                                                                  test esi, esi
                                                                  je 00007F8234B41F37h
                                                                  cmp esi, 03h
                                                                  jne 00007F8234B41F58h
                                                                  push edi
                                                                  push esi
                                                                  push ebx
                                                                  call 00007F8234B41E15h
                                                                  test eax, eax
                                                                  jne 00007F8234B41F35h
                                                                  and dword ptr [ebp+0Ch], eax
                                                                  cmp dword ptr [ebp+0Ch], 00000000h
                                                                  je 00007F8234B41F43h
                                                                  mov eax, dword ptr [10003150h]
                                                                  test eax, eax
                                                                  je 00007F8234B41F3Ah
                                                                  push edi
                                                                  push esi
                                                                  push ebx
                                                                  call eax
                                                                  mov dword ptr [ebp+0Ch], eax
                                                                  mov eax, dword ptr [ebp+0Ch]
                                                                  pop edi
                                                                  pop esi
                                                                  pop ebx
                                                                  pop ebp
                                                                  retn 000Ch
                                                                  jmp dword ptr [10002028h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  Programming Language:
                                                                  • [ C ] VS98 (6.0) build 8168
                                                                  • [C++] VS98 (6.0) build 8168
                                                                  • [RES] VS98 (6.0) cvtres build 1720
                                                                  • [LNK] VS98 (6.0) imp/exp build 8168
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x40000x5000600x501000fea3fa9d6caac633e79e2e8f99aae159unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  W0x40600x500000dataEnglishUnited States0.8792238235473633
                                                                  DLLImport
                                                                  KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                                  MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                                  NameOrdinalAddress
                                                                  PlayGame10x10001114
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2025-01-15T17:02:02.999711+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.4605401.1.1.153UDP
                                                                  2025-01-15T17:02:04.003257+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730103.224.212.21580TCP
                                                                  2025-01-15T17:02:05.681757+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449732103.224.212.21580TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 15, 2025 17:02:03.309783936 CET4973080192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:03.317243099 CET8049730103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:03.317323923 CET4973080192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:03.317462921 CET4973080192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:03.322267056 CET8049730103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:04.003189087 CET8049730103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:04.003206968 CET8049730103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:04.003257036 CET4973080192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:04.003267050 CET8049730103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:04.003307104 CET4973080192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:04.008481979 CET4973080192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:04.013205051 CET8049730103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:04.351438046 CET4973180192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:04.356384993 CET8049731199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:04.359363079 CET4973180192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:04.367757082 CET4973180192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:04.372931004 CET8049731199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:04.879179001 CET8049731199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:04.879224062 CET8049731199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:04.879288912 CET4973180192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:04.879390955 CET4973180192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:04.883730888 CET4973180192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:04.883765936 CET4973180192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:05.058307886 CET4973280192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.063229084 CET8049732103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:05.063324928 CET4973280192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.063698053 CET4973280192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.068558931 CET8049732103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:05.681677103 CET8049732103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:05.681756973 CET4973280192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.681838989 CET8049732103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:05.681888103 CET4973280192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.684695959 CET4973280192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.689495087 CET8049732103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:05.691370964 CET4973380192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:05.696352005 CET8049733199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:05.696436882 CET4973380192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:05.696553946 CET4973380192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:05.701381922 CET8049733199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:05.773909092 CET4973480192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.779064894 CET8049734103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:05.779149055 CET4973480192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.779393911 CET4973480192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:05.784188032 CET8049734103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:06.161392927 CET8049733199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:06.161468029 CET4973380192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.161482096 CET8049733199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:06.161525965 CET4973380192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.167591095 CET4973380192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.167622089 CET4973380192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.206001043 CET49735445192.168.2.423.77.54.220
                                                                  Jan 15, 2025 17:02:06.210994005 CET4454973523.77.54.220192.168.2.4
                                                                  Jan 15, 2025 17:02:06.211097002 CET49735445192.168.2.423.77.54.220
                                                                  Jan 15, 2025 17:02:06.211690903 CET49735445192.168.2.423.77.54.220
                                                                  Jan 15, 2025 17:02:06.211949110 CET49736445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:06.216857910 CET4454973623.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:06.216923952 CET49736445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:06.216999054 CET49736445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:06.221116066 CET49737445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:06.223628044 CET4454973523.77.54.220192.168.2.4
                                                                  Jan 15, 2025 17:02:06.223644972 CET4454973623.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:06.225949049 CET4454973723.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:06.226012945 CET49737445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:06.226059914 CET49737445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:06.228916883 CET4454973523.77.54.220192.168.2.4
                                                                  Jan 15, 2025 17:02:06.228981972 CET49735445192.168.2.423.77.54.220
                                                                  Jan 15, 2025 17:02:06.229291916 CET4454973623.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:06.229346991 CET49736445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:06.230900049 CET4454973723.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:06.424515009 CET8049734103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:06.424588919 CET4973480192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:06.424684048 CET8049734103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:06.424738884 CET4973480192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:06.431575060 CET4973480192.168.2.4103.224.212.215
                                                                  Jan 15, 2025 17:02:06.432813883 CET4974480192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.436530113 CET8049734103.224.212.215192.168.2.4
                                                                  Jan 15, 2025 17:02:06.437688112 CET8049744199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:06.437876940 CET4974480192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.437876940 CET4974480192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.442747116 CET8049744199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:06.915353060 CET8049744199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:06.915380955 CET8049744199.59.243.228192.168.2.4
                                                                  Jan 15, 2025 17:02:06.915781021 CET4974480192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.944629908 CET4974480192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:06.944629908 CET4974480192.168.2.4199.59.243.228
                                                                  Jan 15, 2025 17:02:08.221873045 CET49761445192.168.2.4212.39.73.226
                                                                  Jan 15, 2025 17:02:08.226970911 CET44549761212.39.73.226192.168.2.4
                                                                  Jan 15, 2025 17:02:08.227094889 CET49761445192.168.2.4212.39.73.226
                                                                  Jan 15, 2025 17:02:08.227278948 CET49761445192.168.2.4212.39.73.226
                                                                  Jan 15, 2025 17:02:08.231695890 CET49762445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:08.232621908 CET44549761212.39.73.226192.168.2.4
                                                                  Jan 15, 2025 17:02:08.232688904 CET49761445192.168.2.4212.39.73.226
                                                                  Jan 15, 2025 17:02:08.236552000 CET44549762212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:08.236637115 CET49762445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:08.236669064 CET49762445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:08.239717960 CET49763445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:08.241631985 CET44549762212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:08.241707087 CET49762445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:08.244571924 CET44549763212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:08.244647980 CET49763445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:08.244712114 CET49763445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:08.249574900 CET44549763212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:10.237627029 CET49786445192.168.2.4145.201.0.108
                                                                  Jan 15, 2025 17:02:10.242613077 CET44549786145.201.0.108192.168.2.4
                                                                  Jan 15, 2025 17:02:10.242717981 CET49786445192.168.2.4145.201.0.108
                                                                  Jan 15, 2025 17:02:10.242826939 CET49786445192.168.2.4145.201.0.108
                                                                  Jan 15, 2025 17:02:10.243134022 CET49787445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:10.247736931 CET44549786145.201.0.108192.168.2.4
                                                                  Jan 15, 2025 17:02:10.247836113 CET49786445192.168.2.4145.201.0.108
                                                                  Jan 15, 2025 17:02:10.247909069 CET44549787145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:10.247978926 CET49787445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:10.248014927 CET49787445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:10.249319077 CET49788445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:10.252983093 CET44549787145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:10.253062010 CET49787445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:10.254133940 CET44549788145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:10.254211903 CET49788445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:10.254293919 CET49788445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:10.259130001 CET44549788145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:12.252373934 CET49811445192.168.2.447.77.228.154
                                                                  Jan 15, 2025 17:02:12.257395983 CET4454981147.77.228.154192.168.2.4
                                                                  Jan 15, 2025 17:02:12.257478952 CET49811445192.168.2.447.77.228.154
                                                                  Jan 15, 2025 17:02:12.257502079 CET49811445192.168.2.447.77.228.154
                                                                  Jan 15, 2025 17:02:12.257693052 CET49812445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:12.262537003 CET4454981147.77.228.154192.168.2.4
                                                                  Jan 15, 2025 17:02:12.262577057 CET4454981247.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:12.262603045 CET49811445192.168.2.447.77.228.154
                                                                  Jan 15, 2025 17:02:12.262659073 CET49812445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:12.262720108 CET49812445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:12.263843060 CET49813445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:12.267612934 CET4454981247.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:12.267803907 CET4454981247.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:12.267864943 CET49812445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:12.268663883 CET4454981347.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:12.268723011 CET49813445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:12.268771887 CET49813445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:12.273526907 CET4454981347.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:14.268099070 CET49835445192.168.2.4115.185.47.189
                                                                  Jan 15, 2025 17:02:14.273159027 CET44549835115.185.47.189192.168.2.4
                                                                  Jan 15, 2025 17:02:14.273272038 CET49835445192.168.2.4115.185.47.189
                                                                  Jan 15, 2025 17:02:14.273371935 CET49835445192.168.2.4115.185.47.189
                                                                  Jan 15, 2025 17:02:14.273699045 CET49836445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:14.278239965 CET44549835115.185.47.189192.168.2.4
                                                                  Jan 15, 2025 17:02:14.278306007 CET49835445192.168.2.4115.185.47.189
                                                                  Jan 15, 2025 17:02:14.278567076 CET44549836115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:14.278631926 CET49836445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:14.278692961 CET49836445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:14.279782057 CET49837445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:14.283581972 CET44549836115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:14.283675909 CET44549836115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:14.283730030 CET49836445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:14.284584999 CET44549837115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:14.284678936 CET49837445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:14.284725904 CET49837445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:14.289520025 CET44549837115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:16.284941912 CET49858445192.168.2.4180.212.215.222
                                                                  Jan 15, 2025 17:02:16.289882898 CET44549858180.212.215.222192.168.2.4
                                                                  Jan 15, 2025 17:02:16.289978981 CET49858445192.168.2.4180.212.215.222
                                                                  Jan 15, 2025 17:02:16.290038109 CET49858445192.168.2.4180.212.215.222
                                                                  Jan 15, 2025 17:02:16.290447950 CET49859445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:16.294981956 CET44549858180.212.215.222192.168.2.4
                                                                  Jan 15, 2025 17:02:16.295038939 CET49858445192.168.2.4180.212.215.222
                                                                  Jan 15, 2025 17:02:16.295279980 CET44549859180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:16.295345068 CET49859445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:16.295459032 CET49859445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:16.297009945 CET49860445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:16.300343037 CET44549859180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:16.300401926 CET49859445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:16.301783085 CET44549860180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:16.301856995 CET49860445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:16.301929951 CET49860445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:16.306658983 CET44549860180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:18.298774958 CET49882445192.168.2.4159.109.196.74
                                                                  Jan 15, 2025 17:02:18.303678036 CET44549882159.109.196.74192.168.2.4
                                                                  Jan 15, 2025 17:02:18.303791046 CET49882445192.168.2.4159.109.196.74
                                                                  Jan 15, 2025 17:02:18.303886890 CET49882445192.168.2.4159.109.196.74
                                                                  Jan 15, 2025 17:02:18.304066896 CET49883445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:18.308676958 CET44549882159.109.196.74192.168.2.4
                                                                  Jan 15, 2025 17:02:18.308737040 CET49882445192.168.2.4159.109.196.74
                                                                  Jan 15, 2025 17:02:18.308888912 CET44549883159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:18.308960915 CET49883445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:18.309005022 CET49883445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:18.311238050 CET49884445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:18.313910007 CET44549883159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:18.313960075 CET49883445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:18.316056967 CET44549884159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:18.316127062 CET49884445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:18.316258907 CET49884445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:18.321044922 CET44549884159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:20.314517975 CET49906445192.168.2.448.26.87.34
                                                                  Jan 15, 2025 17:02:20.320480108 CET4454990648.26.87.34192.168.2.4
                                                                  Jan 15, 2025 17:02:20.320574999 CET49906445192.168.2.448.26.87.34
                                                                  Jan 15, 2025 17:02:20.320652962 CET49906445192.168.2.448.26.87.34
                                                                  Jan 15, 2025 17:02:20.320790052 CET49907445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:20.326313972 CET4454990648.26.87.34192.168.2.4
                                                                  Jan 15, 2025 17:02:20.326402903 CET49906445192.168.2.448.26.87.34
                                                                  Jan 15, 2025 17:02:20.326486111 CET4454990748.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:20.326560974 CET49907445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:20.326606989 CET49907445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:20.326942921 CET49908445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:20.332349062 CET4454990748.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:20.332433939 CET49907445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:20.332576990 CET4454990848.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:20.332654953 CET49908445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:20.332726955 CET49908445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:20.338213921 CET4454990848.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:20.573082924 CET8049723217.20.57.18192.168.2.4
                                                                  Jan 15, 2025 17:02:20.573235989 CET4972380192.168.2.4217.20.57.18
                                                                  Jan 15, 2025 17:02:20.573271990 CET4972380192.168.2.4217.20.57.18
                                                                  Jan 15, 2025 17:02:20.578083038 CET8049723217.20.57.18192.168.2.4
                                                                  Jan 15, 2025 17:02:22.329926968 CET49931445192.168.2.484.75.149.77
                                                                  Jan 15, 2025 17:02:22.334856987 CET4454993184.75.149.77192.168.2.4
                                                                  Jan 15, 2025 17:02:22.335077047 CET49931445192.168.2.484.75.149.77
                                                                  Jan 15, 2025 17:02:22.335115910 CET49931445192.168.2.484.75.149.77
                                                                  Jan 15, 2025 17:02:22.335279942 CET49932445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:22.339977026 CET4454993184.75.149.77192.168.2.4
                                                                  Jan 15, 2025 17:02:22.340023994 CET4454993284.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:22.340042114 CET49931445192.168.2.484.75.149.77
                                                                  Jan 15, 2025 17:02:22.340106010 CET49932445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:22.340161085 CET49932445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:22.340492010 CET49933445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:22.345093966 CET4454993284.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:22.345149040 CET49932445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:22.345316887 CET4454993384.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:22.345387936 CET49933445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:22.345424891 CET49933445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:22.350188017 CET4454993384.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:24.345596075 CET49954445192.168.2.473.4.193.160
                                                                  Jan 15, 2025 17:02:24.350542068 CET4454995473.4.193.160192.168.2.4
                                                                  Jan 15, 2025 17:02:24.350682020 CET49954445192.168.2.473.4.193.160
                                                                  Jan 15, 2025 17:02:24.350717068 CET49954445192.168.2.473.4.193.160
                                                                  Jan 15, 2025 17:02:24.350922108 CET49955445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:24.355608940 CET4454995473.4.193.160192.168.2.4
                                                                  Jan 15, 2025 17:02:24.355704069 CET4454995573.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:24.355717897 CET4454995473.4.193.160192.168.2.4
                                                                  Jan 15, 2025 17:02:24.355756044 CET49955445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:24.355778933 CET49954445192.168.2.473.4.193.160
                                                                  Jan 15, 2025 17:02:24.355916023 CET49955445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:24.356174946 CET49956445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:24.361001968 CET4454995573.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:24.361020088 CET4454995673.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:24.361056089 CET49955445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:24.361093044 CET49956445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:24.361150026 CET49956445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:24.365995884 CET4454995673.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:26.361188889 CET49979445192.168.2.4156.251.148.77
                                                                  Jan 15, 2025 17:02:26.367861986 CET44549979156.251.148.77192.168.2.4
                                                                  Jan 15, 2025 17:02:26.367990971 CET49979445192.168.2.4156.251.148.77
                                                                  Jan 15, 2025 17:02:26.368127108 CET49979445192.168.2.4156.251.148.77
                                                                  Jan 15, 2025 17:02:26.368365049 CET49980445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:26.372955084 CET44549979156.251.148.77192.168.2.4
                                                                  Jan 15, 2025 17:02:26.373039961 CET49979445192.168.2.4156.251.148.77
                                                                  Jan 15, 2025 17:02:26.373125076 CET44549980156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:26.373193026 CET49980445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:26.373219013 CET49980445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:26.373513937 CET49981445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:26.379725933 CET44549980156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:26.379749060 CET44549981156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:26.379878044 CET49981445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:26.379939079 CET49980445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:26.379975080 CET49981445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:26.386040926 CET44549981156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:27.623459101 CET4454973723.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:27.623724937 CET49737445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:27.625819921 CET49737445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:27.625891924 CET49737445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:27.630661011 CET4454973723.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:27.630705118 CET4454973723.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:28.376797915 CET50004445192.168.2.492.102.45.185
                                                                  Jan 15, 2025 17:02:28.382967949 CET4455000492.102.45.185192.168.2.4
                                                                  Jan 15, 2025 17:02:28.383141994 CET50004445192.168.2.492.102.45.185
                                                                  Jan 15, 2025 17:02:28.383141994 CET50004445192.168.2.492.102.45.185
                                                                  Jan 15, 2025 17:02:28.383399010 CET50005445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:28.389280081 CET4455000592.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:28.389359951 CET50005445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:28.389389038 CET50005445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:28.389439106 CET4455000492.102.45.185192.168.2.4
                                                                  Jan 15, 2025 17:02:28.389508009 CET50004445192.168.2.492.102.45.185
                                                                  Jan 15, 2025 17:02:28.389763117 CET50006445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:28.395042896 CET4455000592.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:28.395073891 CET4455000692.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:28.395144939 CET50005445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:28.395191908 CET50006445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:28.395260096 CET50006445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:28.400101900 CET4455000692.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:29.608747005 CET44549763212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:29.608896017 CET49763445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:29.608979940 CET49763445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:29.609086990 CET49763445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:29.613809109 CET44549763212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:29.613959074 CET44549763212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:30.450536013 CET50028445192.168.2.4142.169.216.201
                                                                  Jan 15, 2025 17:02:30.455609083 CET44550028142.169.216.201192.168.2.4
                                                                  Jan 15, 2025 17:02:30.455729961 CET50028445192.168.2.4142.169.216.201
                                                                  Jan 15, 2025 17:02:30.455785990 CET50028445192.168.2.4142.169.216.201
                                                                  Jan 15, 2025 17:02:30.455913067 CET50029445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:30.460786104 CET44550028142.169.216.201192.168.2.4
                                                                  Jan 15, 2025 17:02:30.460818052 CET44550029142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:30.460889101 CET50028445192.168.2.4142.169.216.201
                                                                  Jan 15, 2025 17:02:30.460928917 CET50029445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:30.464097023 CET50029445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:30.464739084 CET50030445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:30.469110012 CET44550029142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:30.469202042 CET50029445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:30.469672918 CET44550030142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:30.469777107 CET50030445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:30.469819069 CET50030445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:30.474759102 CET44550030142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:30.626575947 CET50033445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:30.631597996 CET4455003323.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:30.631711960 CET50033445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:30.631761074 CET50033445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:30.636637926 CET4455003323.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:31.620529890 CET44549788145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:31.620661974 CET49788445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:31.620866060 CET49788445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:31.620867014 CET49788445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:31.625653982 CET44549788145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:31.625668049 CET44549788145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:32.455132961 CET50040445192.168.2.4119.163.139.138
                                                                  Jan 15, 2025 17:02:32.460346937 CET44550040119.163.139.138192.168.2.4
                                                                  Jan 15, 2025 17:02:32.460556030 CET50040445192.168.2.4119.163.139.138
                                                                  Jan 15, 2025 17:02:32.460597038 CET50040445192.168.2.4119.163.139.138
                                                                  Jan 15, 2025 17:02:32.460732937 CET50041445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:32.465694904 CET44550041119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:32.465778112 CET44550040119.163.139.138192.168.2.4
                                                                  Jan 15, 2025 17:02:32.465790033 CET50041445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:32.465836048 CET50041445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:32.465852022 CET50040445192.168.2.4119.163.139.138
                                                                  Jan 15, 2025 17:02:32.466234922 CET50042445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:32.470799923 CET44550041119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:32.470877886 CET50041445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:32.471008062 CET44550042119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:32.471088886 CET50042445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:32.471116066 CET50042445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:32.475955963 CET44550042119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:32.612711906 CET50043445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:32.617717028 CET44550043212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:32.617870092 CET50043445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:32.617924929 CET50043445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:32.622710943 CET44550043212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:33.636171103 CET4454981347.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:33.636584997 CET49813445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:33.638683081 CET49813445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:33.638816118 CET49813445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:33.645806074 CET4454981347.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:33.645821095 CET4454981347.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:34.470691919 CET50044445192.168.2.4206.137.46.104
                                                                  Jan 15, 2025 17:02:34.476042032 CET44550044206.137.46.104192.168.2.4
                                                                  Jan 15, 2025 17:02:34.477360010 CET50044445192.168.2.4206.137.46.104
                                                                  Jan 15, 2025 17:02:34.477385998 CET50044445192.168.2.4206.137.46.104
                                                                  Jan 15, 2025 17:02:34.477495909 CET50045445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:34.482363939 CET44550045206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:34.482408047 CET44550044206.137.46.104192.168.2.4
                                                                  Jan 15, 2025 17:02:34.482439041 CET50045445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:34.482464075 CET50045445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:34.482465982 CET50044445192.168.2.4206.137.46.104
                                                                  Jan 15, 2025 17:02:34.482889891 CET50046445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:34.488401890 CET44550045206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:34.488418102 CET44550046206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:34.488457918 CET50045445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:34.488503933 CET50046445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:34.488543987 CET50046445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:34.493649006 CET44550046206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:34.626782894 CET50047445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:34.631761074 CET44550047145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:34.631865025 CET50047445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:34.631937981 CET50047445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:34.636733055 CET44550047145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:35.667854071 CET44549837115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:35.667949915 CET49837445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:35.668040991 CET49837445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:35.668137074 CET49837445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:35.672873974 CET44549837115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:35.672934055 CET44549837115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:36.014820099 CET8049724217.20.57.18192.168.2.4
                                                                  Jan 15, 2025 17:02:36.015074015 CET4972480192.168.2.4217.20.57.18
                                                                  Jan 15, 2025 17:02:36.015074968 CET4972480192.168.2.4217.20.57.18
                                                                  Jan 15, 2025 17:02:36.019963980 CET8049724217.20.57.18192.168.2.4
                                                                  Jan 15, 2025 17:02:36.486197948 CET50048445192.168.2.4130.53.73.5
                                                                  Jan 15, 2025 17:02:36.491175890 CET44550048130.53.73.5192.168.2.4
                                                                  Jan 15, 2025 17:02:36.491270065 CET50048445192.168.2.4130.53.73.5
                                                                  Jan 15, 2025 17:02:36.491302967 CET50048445192.168.2.4130.53.73.5
                                                                  Jan 15, 2025 17:02:36.491415024 CET50049445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:36.496189117 CET44550049130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:36.496244907 CET50049445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:36.496247053 CET44550048130.53.73.5192.168.2.4
                                                                  Jan 15, 2025 17:02:36.496269941 CET50049445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:36.496295929 CET50048445192.168.2.4130.53.73.5
                                                                  Jan 15, 2025 17:02:36.496551037 CET50050445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:36.501216888 CET44550049130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:36.501267910 CET50049445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:36.501302958 CET44550050130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:36.501352072 CET50050445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:36.501391888 CET50050445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:36.506128073 CET44550050130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:36.642391920 CET50051445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:36.647327900 CET4455005147.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:36.647423983 CET50051445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:36.647515059 CET50051445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:36.652275085 CET4455005147.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:37.667471886 CET44549860180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:37.667576075 CET49860445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:37.667779922 CET49860445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:37.668335915 CET49860445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:37.672574997 CET44549860180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:37.673176050 CET44549860180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:38.501815081 CET50052445192.168.2.466.28.85.150
                                                                  Jan 15, 2025 17:02:38.507447958 CET4455005266.28.85.150192.168.2.4
                                                                  Jan 15, 2025 17:02:38.507580042 CET50052445192.168.2.466.28.85.150
                                                                  Jan 15, 2025 17:02:38.507664919 CET50052445192.168.2.466.28.85.150
                                                                  Jan 15, 2025 17:02:38.507869959 CET50053445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:38.513073921 CET4455005366.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:02:38.513089895 CET4455005266.28.85.150192.168.2.4
                                                                  Jan 15, 2025 17:02:38.513148069 CET50053445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:38.513170004 CET50052445192.168.2.466.28.85.150
                                                                  Jan 15, 2025 17:02:38.513288975 CET50053445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:38.513761044 CET50054445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:38.518325090 CET4455005366.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:02:38.518395901 CET50053445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:38.518702984 CET4455005466.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:02:38.518769026 CET50054445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:38.518810987 CET50054445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:38.523622990 CET4455005466.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:02:38.673662901 CET50055445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:38.678900003 CET44550055115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:38.679007053 CET50055445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:38.679085970 CET50055445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:02:38.683923006 CET44550055115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:02:39.671211958 CET44549884159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:39.671506882 CET49884445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:39.671506882 CET49884445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:39.671506882 CET49884445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:39.676415920 CET44549884159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:39.676434040 CET44549884159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:40.517960072 CET50056445192.168.2.4103.135.215.157
                                                                  Jan 15, 2025 17:02:40.522831917 CET44550056103.135.215.157192.168.2.4
                                                                  Jan 15, 2025 17:02:40.522937059 CET50056445192.168.2.4103.135.215.157
                                                                  Jan 15, 2025 17:02:40.522969007 CET50056445192.168.2.4103.135.215.157
                                                                  Jan 15, 2025 17:02:40.523149967 CET50057445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:40.527925968 CET44550056103.135.215.157192.168.2.4
                                                                  Jan 15, 2025 17:02:40.527957916 CET44550057103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:40.528007984 CET50056445192.168.2.4103.135.215.157
                                                                  Jan 15, 2025 17:02:40.528165102 CET50057445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:40.528193951 CET50057445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:40.528459072 CET50058445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:40.533142090 CET44550057103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:40.533201933 CET50057445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:40.533235073 CET44550058103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:40.533296108 CET50058445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:40.533348083 CET50058445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:40.538099051 CET44550058103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:40.673437119 CET50059445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:40.678441048 CET44550059180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:40.678556919 CET50059445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:40.678596020 CET50059445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:02:40.683439016 CET44550059180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:41.698772907 CET4454990848.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:41.698857069 CET49908445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:41.698889971 CET49908445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:41.698934078 CET49908445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:41.703824997 CET4454990848.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:41.703856945 CET4454990848.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:42.392493963 CET50060445192.168.2.4116.97.98.20
                                                                  Jan 15, 2025 17:02:42.397579908 CET44550060116.97.98.20192.168.2.4
                                                                  Jan 15, 2025 17:02:42.397733927 CET50060445192.168.2.4116.97.98.20
                                                                  Jan 15, 2025 17:02:42.397775888 CET50060445192.168.2.4116.97.98.20
                                                                  Jan 15, 2025 17:02:42.397886992 CET50061445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:02:42.402759075 CET44550061116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:02:42.402829885 CET50061445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:02:42.402861118 CET50061445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:02:42.402942896 CET44550060116.97.98.20192.168.2.4
                                                                  Jan 15, 2025 17:02:42.403002977 CET50060445192.168.2.4116.97.98.20
                                                                  Jan 15, 2025 17:02:42.403230906 CET50062445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:02:42.407907009 CET44550061116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:02:42.407995939 CET50061445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:02:42.408272982 CET44550062116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:02:42.408351898 CET50062445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:02:42.408392906 CET50062445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:02:42.413224936 CET44550062116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:02:42.673508883 CET50063445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:42.678904057 CET44550063159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:42.679052114 CET50063445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:42.679097891 CET50063445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:02:42.684346914 CET44550063159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:02:43.747695923 CET4454993384.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:43.747925997 CET49933445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:43.747925997 CET49933445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:43.748105049 CET49933445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:43.753524065 CET4454993384.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:43.753556967 CET4454993384.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:44.142333984 CET50064445192.168.2.4108.104.123.234
                                                                  Jan 15, 2025 17:02:44.147392988 CET44550064108.104.123.234192.168.2.4
                                                                  Jan 15, 2025 17:02:44.147502899 CET50064445192.168.2.4108.104.123.234
                                                                  Jan 15, 2025 17:02:44.147557020 CET50064445192.168.2.4108.104.123.234
                                                                  Jan 15, 2025 17:02:44.147819996 CET50065445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:02:44.152704000 CET44550065108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:02:44.152734995 CET44550064108.104.123.234192.168.2.4
                                                                  Jan 15, 2025 17:02:44.152775049 CET50065445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:02:44.152806997 CET50064445192.168.2.4108.104.123.234
                                                                  Jan 15, 2025 17:02:44.152972937 CET50065445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:02:44.153414965 CET50066445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:02:44.157918930 CET44550065108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:02:44.157978058 CET50065445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:02:44.158272982 CET44550066108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:02:44.158345938 CET50066445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:02:44.158390999 CET50066445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:02:44.163230896 CET44550066108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:02:44.704694033 CET50067445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:44.709850073 CET4455006748.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:44.709943056 CET50067445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:44.709979057 CET50067445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:02:44.716109991 CET4455006748.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:02:45.730736971 CET4454995673.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:45.730838060 CET49956445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:45.730946064 CET49956445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:45.730946064 CET49956445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:45.735984087 CET4454995673.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:45.736022949 CET4454995673.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:45.783132076 CET50068445192.168.2.4184.47.24.152
                                                                  Jan 15, 2025 17:02:45.788386106 CET44550068184.47.24.152192.168.2.4
                                                                  Jan 15, 2025 17:02:45.788480997 CET50068445192.168.2.4184.47.24.152
                                                                  Jan 15, 2025 17:02:45.788499117 CET50068445192.168.2.4184.47.24.152
                                                                  Jan 15, 2025 17:02:45.788722992 CET50069445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:02:45.793663979 CET44550068184.47.24.152192.168.2.4
                                                                  Jan 15, 2025 17:02:45.793698072 CET44550069184.47.24.1192.168.2.4
                                                                  Jan 15, 2025 17:02:45.793731928 CET50068445192.168.2.4184.47.24.152
                                                                  Jan 15, 2025 17:02:45.793777943 CET50069445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:02:45.793860912 CET50069445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:02:45.794056892 CET50070445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:02:45.798748016 CET44550069184.47.24.1192.168.2.4
                                                                  Jan 15, 2025 17:02:45.798824072 CET50069445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:02:45.798923016 CET44550070184.47.24.1192.168.2.4
                                                                  Jan 15, 2025 17:02:45.798985958 CET50070445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:02:45.799005032 CET50070445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:02:45.803915024 CET44550070184.47.24.1192.168.2.4
                                                                  Jan 15, 2025 17:02:46.751539946 CET50071445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:46.756808043 CET4455007184.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:46.756903887 CET50071445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:46.756972075 CET50071445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:02:46.761945963 CET4455007184.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:02:47.314747095 CET50072445192.168.2.440.24.94.201
                                                                  Jan 15, 2025 17:02:47.319861889 CET4455007240.24.94.201192.168.2.4
                                                                  Jan 15, 2025 17:02:47.319993019 CET50072445192.168.2.440.24.94.201
                                                                  Jan 15, 2025 17:02:47.320034981 CET50072445192.168.2.440.24.94.201
                                                                  Jan 15, 2025 17:02:47.320483923 CET50073445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:02:47.325191021 CET4455007240.24.94.201192.168.2.4
                                                                  Jan 15, 2025 17:02:47.325270891 CET50072445192.168.2.440.24.94.201
                                                                  Jan 15, 2025 17:02:47.325310946 CET4455007340.24.94.1192.168.2.4
                                                                  Jan 15, 2025 17:02:47.325386047 CET50073445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:02:47.325505972 CET50073445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:02:47.325808048 CET50074445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:02:47.330432892 CET4455007340.24.94.1192.168.2.4
                                                                  Jan 15, 2025 17:02:47.330526114 CET50073445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:02:47.330760956 CET4455007440.24.94.1192.168.2.4
                                                                  Jan 15, 2025 17:02:47.330821037 CET50074445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:02:47.330856085 CET50074445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:02:47.335633039 CET4455007440.24.94.1192.168.2.4
                                                                  Jan 15, 2025 17:02:47.730037928 CET44549981156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:47.730160952 CET49981445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:47.730253935 CET49981445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:47.730304003 CET49981445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:47.735071898 CET44549981156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:47.735173941 CET44549981156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:48.735888958 CET50075445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:48.736138105 CET50076445192.168.2.4169.137.120.210
                                                                  Jan 15, 2025 17:02:48.740813017 CET4455007573.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:48.740909100 CET50075445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:48.740923882 CET50075445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:02:48.740931034 CET44550076169.137.120.210192.168.2.4
                                                                  Jan 15, 2025 17:02:48.740981102 CET50076445192.168.2.4169.137.120.210
                                                                  Jan 15, 2025 17:02:48.741003036 CET50076445192.168.2.4169.137.120.210
                                                                  Jan 15, 2025 17:02:48.741101980 CET50077445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:02:48.745666981 CET4455007573.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:02:48.745830059 CET44550077169.137.120.1192.168.2.4
                                                                  Jan 15, 2025 17:02:48.745892048 CET50077445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:02:48.746028900 CET44550076169.137.120.210192.168.2.4
                                                                  Jan 15, 2025 17:02:48.746052980 CET50077445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:02:48.746073008 CET50076445192.168.2.4169.137.120.210
                                                                  Jan 15, 2025 17:02:48.746318102 CET50078445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:02:48.751734018 CET44550077169.137.120.1192.168.2.4
                                                                  Jan 15, 2025 17:02:48.751745939 CET44550078169.137.120.1192.168.2.4
                                                                  Jan 15, 2025 17:02:48.751785994 CET50077445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:02:48.751817942 CET50078445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:02:48.751868963 CET50078445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:02:48.757508993 CET44550078169.137.120.1192.168.2.4
                                                                  Jan 15, 2025 17:02:49.782547951 CET4455000692.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:49.782721043 CET50006445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:49.782762051 CET50006445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:49.782815933 CET50006445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:49.787622929 CET4455000692.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:49.787635088 CET4455000692.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.065130949 CET50079445192.168.2.424.5.32.215
                                                                  Jan 15, 2025 17:02:50.070106983 CET4455007924.5.32.215192.168.2.4
                                                                  Jan 15, 2025 17:02:50.070195913 CET50079445192.168.2.424.5.32.215
                                                                  Jan 15, 2025 17:02:50.070389986 CET50079445192.168.2.424.5.32.215
                                                                  Jan 15, 2025 17:02:50.070863008 CET50080445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:02:50.075325012 CET4455007924.5.32.215192.168.2.4
                                                                  Jan 15, 2025 17:02:50.075421095 CET50079445192.168.2.424.5.32.215
                                                                  Jan 15, 2025 17:02:50.075658083 CET4455008024.5.32.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.075726986 CET50080445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:02:50.076020956 CET50080445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:02:50.076479912 CET50081445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:02:50.080879927 CET4455008024.5.32.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.080952883 CET50080445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:02:50.081298113 CET4455008124.5.32.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.081357956 CET50081445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:02:50.081388950 CET50081445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:02:50.086112022 CET4455008124.5.32.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.127608061 CET44550058103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.127808094 CET50058445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:50.127808094 CET50058445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:50.129338980 CET50058445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:50.132754087 CET44550058103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.134121895 CET44550058103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.735932112 CET50082445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:50.740864038 CET44550082156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:50.740969896 CET50082445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:50.741103888 CET50082445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:02:50.745831966 CET44550082156.251.148.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.314304113 CET50083445192.168.2.481.189.195.27
                                                                  Jan 15, 2025 17:02:51.319423914 CET4455008381.189.195.27192.168.2.4
                                                                  Jan 15, 2025 17:02:51.319562912 CET50083445192.168.2.481.189.195.27
                                                                  Jan 15, 2025 17:02:51.319607973 CET50083445192.168.2.481.189.195.27
                                                                  Jan 15, 2025 17:02:51.319713116 CET50084445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:02:51.324603081 CET4455008481.189.195.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.324673891 CET4455008381.189.195.27192.168.2.4
                                                                  Jan 15, 2025 17:02:51.324683905 CET50084445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:02:51.324704885 CET50084445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:02:51.324733973 CET50083445192.168.2.481.189.195.27
                                                                  Jan 15, 2025 17:02:51.325124979 CET50085445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:02:51.329605103 CET4455008481.189.195.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.329659939 CET50084445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:02:51.329900026 CET4455008581.189.195.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.329957962 CET50085445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:02:51.329992056 CET50085445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:02:51.334795952 CET4455008581.189.195.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.841854095 CET44550030142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.842004061 CET50030445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:51.842053890 CET50030445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:51.842108011 CET50030445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:51.848252058 CET44550030142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.848287106 CET44550030142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.996335030 CET4455003323.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:51.996406078 CET50033445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:51.996447086 CET50033445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:51.996505022 CET50033445192.168.2.423.77.54.1
                                                                  Jan 15, 2025 17:02:52.002094030 CET4455003323.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:52.002104998 CET4455003323.77.54.1192.168.2.4
                                                                  Jan 15, 2025 17:02:52.048450947 CET50086445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:02:52.054075956 CET4455008623.77.54.2192.168.2.4
                                                                  Jan 15, 2025 17:02:52.054137945 CET50086445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:02:52.054195881 CET50086445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:02:52.054502964 CET50087445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:02:52.059362888 CET4455008623.77.54.2192.168.2.4
                                                                  Jan 15, 2025 17:02:52.059376001 CET4455008723.77.54.2192.168.2.4
                                                                  Jan 15, 2025 17:02:52.059416056 CET50086445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:02:52.059457064 CET50087445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:02:52.059494019 CET50087445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:02:52.064435959 CET4455008723.77.54.2192.168.2.4
                                                                  Jan 15, 2025 17:02:52.798408031 CET50089445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:52.803306103 CET4455008992.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:52.803396940 CET50089445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:52.803550959 CET50089445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:02:52.808301926 CET4455008992.102.45.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.142030001 CET50090445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:53.146939039 CET44550090103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.147002935 CET50090445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:53.147030115 CET50090445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:02:53.151818991 CET44550090103.135.215.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.549153090 CET50091445192.168.2.491.148.191.112
                                                                  Jan 15, 2025 17:02:53.554292917 CET4455009191.148.191.112192.168.2.4
                                                                  Jan 15, 2025 17:02:53.554397106 CET50091445192.168.2.491.148.191.112
                                                                  Jan 15, 2025 17:02:53.554481030 CET50091445192.168.2.491.148.191.112
                                                                  Jan 15, 2025 17:02:53.554821968 CET50092445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:53.559494019 CET4455009191.148.191.112192.168.2.4
                                                                  Jan 15, 2025 17:02:53.559581995 CET50091445192.168.2.491.148.191.112
                                                                  Jan 15, 2025 17:02:53.559767008 CET4455009291.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.559842110 CET50092445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:53.559905052 CET50092445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:53.560225964 CET50093445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:53.564970016 CET4455009291.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.565057993 CET50092445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:53.565110922 CET4455009391.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.565186024 CET50093445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:53.565226078 CET50093445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:53.570070982 CET4455009391.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.579576015 CET50094445192.168.2.438.46.21.27
                                                                  Jan 15, 2025 17:02:53.584491968 CET4455009438.46.21.27192.168.2.4
                                                                  Jan 15, 2025 17:02:53.584687948 CET50094445192.168.2.438.46.21.27
                                                                  Jan 15, 2025 17:02:53.584789991 CET50094445192.168.2.438.46.21.27
                                                                  Jan 15, 2025 17:02:53.584952116 CET50095445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:53.589658022 CET4455009438.46.21.27192.168.2.4
                                                                  Jan 15, 2025 17:02:53.589725971 CET50094445192.168.2.438.46.21.27
                                                                  Jan 15, 2025 17:02:53.589824915 CET4455009538.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.589899063 CET50095445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:53.589934111 CET50095445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:53.590285063 CET50096445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:53.594852924 CET4455009538.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.594916105 CET50095445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:53.595098972 CET4455009638.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.595154047 CET50096445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:53.595191002 CET50096445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:53.600033998 CET4455009638.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.856213093 CET44550042119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.856414080 CET50042445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:53.856453896 CET50042445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:53.856501102 CET50042445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:53.861745119 CET44550042119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.861757040 CET44550042119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.980937958 CET44550043212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.981017113 CET50043445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:53.981081963 CET50043445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:53.981154919 CET50043445192.168.2.4212.39.73.1
                                                                  Jan 15, 2025 17:02:53.986610889 CET44550043212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:53.986624956 CET44550043212.39.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:54.033256054 CET50097445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:02:54.038392067 CET44550097212.39.73.2192.168.2.4
                                                                  Jan 15, 2025 17:02:54.038516045 CET50097445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:02:54.038561106 CET50097445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:02:54.038937092 CET50098445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:02:54.043605089 CET44550097212.39.73.2192.168.2.4
                                                                  Jan 15, 2025 17:02:54.043863058 CET44550097212.39.73.2192.168.2.4
                                                                  Jan 15, 2025 17:02:54.043894053 CET44550098212.39.73.2192.168.2.4
                                                                  Jan 15, 2025 17:02:54.043924093 CET50097445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:02:54.043957949 CET50098445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:02:54.043987989 CET50098445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:02:54.048801899 CET44550098212.39.73.2192.168.2.4
                                                                  Jan 15, 2025 17:02:54.564223051 CET50099445192.168.2.4211.237.66.129
                                                                  Jan 15, 2025 17:02:54.569354057 CET44550099211.237.66.129192.168.2.4
                                                                  Jan 15, 2025 17:02:54.569463968 CET50099445192.168.2.4211.237.66.129
                                                                  Jan 15, 2025 17:02:54.569528103 CET50099445192.168.2.4211.237.66.129
                                                                  Jan 15, 2025 17:02:54.569749117 CET50100445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:02:54.574592113 CET44550100211.237.66.1192.168.2.4
                                                                  Jan 15, 2025 17:02:54.574625015 CET44550099211.237.66.129192.168.2.4
                                                                  Jan 15, 2025 17:02:54.574685097 CET50100445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:02:54.574771881 CET50099445192.168.2.4211.237.66.129
                                                                  Jan 15, 2025 17:02:54.574773073 CET50100445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:02:54.574934006 CET50101445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:02:54.579787016 CET44550100211.237.66.1192.168.2.4
                                                                  Jan 15, 2025 17:02:54.579799891 CET44550101211.237.66.1192.168.2.4
                                                                  Jan 15, 2025 17:02:54.579854012 CET50100445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:02:54.579879999 CET50101445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:02:54.579910994 CET50101445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:02:54.584712982 CET44550101211.237.66.1192.168.2.4
                                                                  Jan 15, 2025 17:02:54.845531940 CET50102445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:54.850497007 CET44550102142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:54.850591898 CET50102445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:54.850636005 CET50102445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:02:54.855432987 CET44550102142.169.216.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.235404968 CET4455009638.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.235671043 CET50096445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:55.235763073 CET50096445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:55.235820055 CET50096445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:55.240595102 CET4455009638.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.240612984 CET4455009638.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.279552937 CET4455009391.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.279887915 CET50093445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:55.279959917 CET50093445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:55.280028105 CET50093445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:55.284703016 CET4455009391.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.284745932 CET4455009391.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.503226042 CET50103445192.168.2.440.235.31.113
                                                                  Jan 15, 2025 17:02:55.508147001 CET4455010340.235.31.113192.168.2.4
                                                                  Jan 15, 2025 17:02:55.508219957 CET50103445192.168.2.440.235.31.113
                                                                  Jan 15, 2025 17:02:55.508253098 CET50103445192.168.2.440.235.31.113
                                                                  Jan 15, 2025 17:02:55.508404016 CET50104445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:02:55.513170958 CET4455010440.235.31.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.513183117 CET4455010340.235.31.113192.168.2.4
                                                                  Jan 15, 2025 17:02:55.513246059 CET50104445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:02:55.513263941 CET50103445192.168.2.440.235.31.113
                                                                  Jan 15, 2025 17:02:55.513355017 CET50104445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:02:55.513641119 CET50105445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:02:55.518296957 CET4455010440.235.31.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.518373966 CET50104445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:02:55.518439054 CET4455010540.235.31.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.518501043 CET50105445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:02:55.518543959 CET50105445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:02:55.523248911 CET4455010540.235.31.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.858881950 CET44550046206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.859144926 CET50046445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:55.859240055 CET50046445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:55.859240055 CET50046445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:55.864082098 CET44550046206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:55.864094019 CET44550046206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.015635967 CET44550047145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.015821934 CET50047445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:56.015933037 CET50047445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:56.016002893 CET50047445192.168.2.4145.201.0.1
                                                                  Jan 15, 2025 17:02:56.020982981 CET44550047145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.021013021 CET44550047145.201.0.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.079706907 CET50106445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:02:56.084655046 CET44550106145.201.0.2192.168.2.4
                                                                  Jan 15, 2025 17:02:56.084718943 CET50106445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:02:56.084780931 CET50106445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:02:56.085124016 CET50107445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:02:56.089965105 CET44550107145.201.0.2192.168.2.4
                                                                  Jan 15, 2025 17:02:56.090058088 CET50107445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:02:56.090058088 CET50107445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:02:56.094926119 CET44550107145.201.0.2192.168.2.4
                                                                  Jan 15, 2025 17:02:56.095622063 CET44550106145.201.0.2192.168.2.4
                                                                  Jan 15, 2025 17:02:56.098134995 CET44550106145.201.0.2192.168.2.4
                                                                  Jan 15, 2025 17:02:56.098191977 CET50106445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:02:56.392687082 CET50108445192.168.2.44.147.179.228
                                                                  Jan 15, 2025 17:02:56.397742987 CET445501084.147.179.228192.168.2.4
                                                                  Jan 15, 2025 17:02:56.397878885 CET50108445192.168.2.44.147.179.228
                                                                  Jan 15, 2025 17:02:56.397959948 CET50108445192.168.2.44.147.179.228
                                                                  Jan 15, 2025 17:02:56.398200035 CET50109445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:02:56.402965069 CET445501084.147.179.228192.168.2.4
                                                                  Jan 15, 2025 17:02:56.403053999 CET50108445192.168.2.44.147.179.228
                                                                  Jan 15, 2025 17:02:56.403111935 CET445501094.147.179.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.403187990 CET50109445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:02:56.403254032 CET50109445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:02:56.403525114 CET50110445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:02:56.408231020 CET445501094.147.179.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.408309937 CET50109445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:02:56.408446074 CET445501104.147.179.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.408509970 CET50110445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:02:56.408591032 CET50110445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:02:56.413389921 CET445501104.147.179.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.860939026 CET50111445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:56.865897894 CET44550111119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:56.866009951 CET50111445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:56.866091013 CET50111445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:02:56.870908022 CET44550111119.163.139.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.220653057 CET50114445192.168.2.4178.206.229.68
                                                                  Jan 15, 2025 17:02:57.225586891 CET44550114178.206.229.68192.168.2.4
                                                                  Jan 15, 2025 17:02:57.225673914 CET50114445192.168.2.4178.206.229.68
                                                                  Jan 15, 2025 17:02:57.225720882 CET50114445192.168.2.4178.206.229.68
                                                                  Jan 15, 2025 17:02:57.225907087 CET50115445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:02:57.230817080 CET44550115178.206.229.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.230832100 CET44550114178.206.229.68192.168.2.4
                                                                  Jan 15, 2025 17:02:57.230921984 CET50114445192.168.2.4178.206.229.68
                                                                  Jan 15, 2025 17:02:57.230930090 CET50115445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:02:57.231050014 CET50115445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:02:57.231522083 CET50116445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:02:57.236002922 CET44550115178.206.229.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.236062050 CET50115445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:02:57.236296892 CET44550116178.206.229.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.236377954 CET50116445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:02:57.236426115 CET50116445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:02:57.241211891 CET44550116178.206.229.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.892591000 CET44550050130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.897386074 CET50050445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:57.897466898 CET50050445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:57.897524118 CET50050445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:02:57.902842045 CET44550050130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.903139114 CET44550050130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.986104012 CET50117445192.168.2.426.97.17.35
                                                                  Jan 15, 2025 17:02:57.990895033 CET4455011726.97.17.35192.168.2.4
                                                                  Jan 15, 2025 17:02:57.991013050 CET50117445192.168.2.426.97.17.35
                                                                  Jan 15, 2025 17:02:57.991132021 CET50117445192.168.2.426.97.17.35
                                                                  Jan 15, 2025 17:02:57.991221905 CET50118445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:02:57.995991945 CET4455011726.97.17.35192.168.2.4
                                                                  Jan 15, 2025 17:02:57.996004105 CET4455011826.97.17.1192.168.2.4
                                                                  Jan 15, 2025 17:02:57.996046066 CET50117445192.168.2.426.97.17.35
                                                                  Jan 15, 2025 17:02:57.996083975 CET50118445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:02:57.996190071 CET50118445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:02:57.996588945 CET50119445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:02:58.001386881 CET4455011926.97.17.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.001440048 CET4455011826.97.17.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.001442909 CET50119445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:02:58.001483917 CET50118445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:02:58.002495050 CET50119445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:02:58.007272005 CET4455011926.97.17.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.011436939 CET4455005147.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.011503935 CET50051445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:58.011558056 CET50051445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:58.011673927 CET50051445192.168.2.447.77.228.1
                                                                  Jan 15, 2025 17:02:58.016325951 CET4455005147.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.016412973 CET4455005147.77.228.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.064682961 CET50120445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:02:58.069655895 CET4455012047.77.228.2192.168.2.4
                                                                  Jan 15, 2025 17:02:58.070642948 CET50120445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:02:58.070723057 CET50120445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:02:58.071161985 CET50121445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:02:58.075588942 CET4455012047.77.228.2192.168.2.4
                                                                  Jan 15, 2025 17:02:58.075615883 CET4455012047.77.228.2192.168.2.4
                                                                  Jan 15, 2025 17:02:58.075681925 CET50120445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:02:58.076016903 CET4455012147.77.228.2192.168.2.4
                                                                  Jan 15, 2025 17:02:58.076107025 CET50121445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:02:58.076160908 CET50121445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:02:58.080984116 CET4455012147.77.228.2192.168.2.4
                                                                  Jan 15, 2025 17:02:58.251516104 CET50127445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:58.256525040 CET4455012738.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.256619930 CET50127445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:58.256654024 CET50127445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:58.261511087 CET4455012738.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.282701969 CET50128445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:58.287600994 CET4455012891.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.287683964 CET50128445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:58.287753105 CET50128445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:58.292525053 CET4455012891.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.860874891 CET50130445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:58.866319895 CET44550130206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:58.866457939 CET50130445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:58.866532087 CET50130445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:02:58.871942043 CET44550130206.137.46.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.872840881 CET4455012738.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.872999907 CET50127445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:59.873056889 CET50127445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:59.873056889 CET50127445192.168.2.438.46.21.1
                                                                  Jan 15, 2025 17:02:59.877893925 CET4455012738.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.877926111 CET4455012738.46.21.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.921849966 CET4455005466.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.922029018 CET50054445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:59.922084093 CET50054445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:59.922106028 CET50054445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:02:59.926956892 CET4455005466.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.926968098 CET4455005466.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.938972950 CET50143445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:02:59.943861008 CET4455014338.46.21.2192.168.2.4
                                                                  Jan 15, 2025 17:02:59.943944931 CET50143445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:02:59.943955898 CET50143445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:02:59.944211960 CET50144445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:02:59.949063063 CET4455014338.46.21.2192.168.2.4
                                                                  Jan 15, 2025 17:02:59.949121952 CET50143445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:02:59.949145079 CET4455014438.46.21.2192.168.2.4
                                                                  Jan 15, 2025 17:02:59.949222088 CET50144445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:02:59.949260950 CET50144445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:02:59.954075098 CET4455014438.46.21.2192.168.2.4
                                                                  Jan 15, 2025 17:02:59.999340057 CET4455012891.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:02:59.999533892 CET50128445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:59.999577999 CET50128445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:02:59.999627113 CET50128445192.168.2.491.148.191.1
                                                                  Jan 15, 2025 17:03:00.004455090 CET4455012891.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:03:00.004484892 CET4455012891.148.191.1192.168.2.4
                                                                  Jan 15, 2025 17:03:00.064038038 CET50146445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:00.234586000 CET44550055115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:03:00.234853983 CET50055445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:03:00.235054016 CET50055445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:03:00.235124111 CET50055445192.168.2.4115.185.47.1
                                                                  Jan 15, 2025 17:03:00.235265970 CET4455014691.148.191.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.235347986 CET50146445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:00.235443115 CET50146445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:00.235893965 CET50147445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:00.240207911 CET44550055115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:03:00.240216970 CET44550055115.185.47.1192.168.2.4
                                                                  Jan 15, 2025 17:03:00.240415096 CET4455014691.148.191.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.240469933 CET50146445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:00.240626097 CET4455014791.148.191.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.240686893 CET50147445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:00.240705013 CET50147445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:00.245449066 CET4455014791.148.191.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.298525095 CET50148445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:00.303388119 CET44550148115.185.47.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.303457975 CET50148445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:00.303488016 CET50148445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:00.303889036 CET50149445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:00.308497906 CET44550148115.185.47.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.308561087 CET50148445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:00.308845997 CET44550149115.185.47.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.308901072 CET50149445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:00.308938980 CET50149445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:00.313718081 CET44550149115.185.47.2192.168.2.4
                                                                  Jan 15, 2025 17:03:00.907728910 CET50156445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:03:00.912763119 CET44550156130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:03:00.912830114 CET50156445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:03:00.912853003 CET50156445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:03:00.917694092 CET44550156130.53.73.1192.168.2.4
                                                                  Jan 15, 2025 17:03:02.063915014 CET44550059180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:03:02.063997030 CET50059445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:03:02.064052105 CET50059445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:03:02.064106941 CET50059445192.168.2.4180.212.215.1
                                                                  Jan 15, 2025 17:03:02.071424007 CET44550059180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:03:02.071459055 CET44550059180.212.215.1192.168.2.4
                                                                  Jan 15, 2025 17:03:02.126652956 CET50173445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:02.131643057 CET44550173180.212.215.2192.168.2.4
                                                                  Jan 15, 2025 17:03:02.131748915 CET50173445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:02.131784916 CET50173445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:02.132132053 CET50174445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:02.136804104 CET44550173180.212.215.2192.168.2.4
                                                                  Jan 15, 2025 17:03:02.136879921 CET50173445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:02.137036085 CET44550174180.212.215.2192.168.2.4
                                                                  Jan 15, 2025 17:03:02.137111902 CET50174445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:02.137155056 CET50174445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:02.142004967 CET44550174180.212.215.2192.168.2.4
                                                                  Jan 15, 2025 17:03:02.923453093 CET50187445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:03:02.928302050 CET4455018766.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:03:02.928859949 CET50187445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:03:02.928900003 CET50187445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:03:02.934235096 CET4455018766.28.85.1192.168.2.4
                                                                  Jan 15, 2025 17:03:03.777040958 CET44550062116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:03:03.777117968 CET50062445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:03:03.777163982 CET50062445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:03:03.777206898 CET50062445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:03:03.781985044 CET44550062116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:03:03.781996012 CET44550062116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:03:04.027029991 CET44550063159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:03:04.027107954 CET50063445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:03:04.027168036 CET50063445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:03:04.027205944 CET50063445192.168.2.4159.109.196.1
                                                                  Jan 15, 2025 17:03:04.031924009 CET44550063159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:03:04.031935930 CET44550063159.109.196.1192.168.2.4
                                                                  Jan 15, 2025 17:03:04.079668045 CET50205445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:04.084446907 CET44550205159.109.196.2192.168.2.4
                                                                  Jan 15, 2025 17:03:04.084664106 CET50205445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:04.084664106 CET50205445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:04.084966898 CET50206445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:04.089601994 CET44550205159.109.196.2192.168.2.4
                                                                  Jan 15, 2025 17:03:04.089660883 CET50205445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:04.089781046 CET44550206159.109.196.2192.168.2.4
                                                                  Jan 15, 2025 17:03:04.089859009 CET50206445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:04.089890003 CET50206445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:04.094645023 CET44550206159.109.196.2192.168.2.4
                                                                  Jan 15, 2025 17:03:05.527380943 CET44550066108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:03:05.527446032 CET50066445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:03:05.527498007 CET50066445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:03:05.527523041 CET50066445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:03:05.532318115 CET44550066108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:03:05.532329082 CET44550066108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:03:06.075469017 CET4455006748.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:03:06.075546026 CET50067445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:03:06.075603962 CET50067445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:03:06.075634956 CET50067445192.168.2.448.26.87.1
                                                                  Jan 15, 2025 17:03:06.081099033 CET4455006748.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:03:06.081109047 CET4455006748.26.87.1192.168.2.4
                                                                  Jan 15, 2025 17:03:06.126681089 CET50251445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:06.133388996 CET4455025148.26.87.2192.168.2.4
                                                                  Jan 15, 2025 17:03:06.133490086 CET50251445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:06.133553028 CET50251445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:06.134074926 CET50252445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:06.138809919 CET4455025148.26.87.2192.168.2.4
                                                                  Jan 15, 2025 17:03:06.138869047 CET50251445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:06.139378071 CET4455025248.26.87.2192.168.2.4
                                                                  Jan 15, 2025 17:03:06.139446974 CET50252445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:06.139482021 CET50252445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:06.144268036 CET4455025248.26.87.2192.168.2.4
                                                                  Jan 15, 2025 17:03:06.784003973 CET50267445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:03:06.788940907 CET44550267116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:03:06.789025068 CET50267445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:03:06.789057970 CET50267445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:03:06.793850899 CET44550267116.97.98.1192.168.2.4
                                                                  Jan 15, 2025 17:03:07.152244091 CET44550070184.47.24.1192.168.2.4
                                                                  Jan 15, 2025 17:03:07.152337074 CET50070445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:03:07.153578043 CET50070445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:03:07.153613091 CET50070445192.168.2.4184.47.24.1
                                                                  Jan 15, 2025 17:03:07.158385992 CET44550070184.47.24.1192.168.2.4
                                                                  Jan 15, 2025 17:03:07.158397913 CET44550070184.47.24.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.124758959 CET4455007184.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.124845982 CET50071445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:03:08.124892950 CET50071445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:03:08.124905109 CET50071445192.168.2.484.75.149.1
                                                                  Jan 15, 2025 17:03:08.129699945 CET4455007184.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.129712105 CET4455007184.75.149.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.189027071 CET50318445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:08.193808079 CET4455031884.75.149.2192.168.2.4
                                                                  Jan 15, 2025 17:03:08.193903923 CET50318445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:08.193923950 CET50318445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:08.194339991 CET50319445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:08.199100018 CET4455031984.75.149.2192.168.2.4
                                                                  Jan 15, 2025 17:03:08.199168921 CET50319445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:08.199186087 CET50319445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:08.199568033 CET4455031884.75.149.2192.168.2.4
                                                                  Jan 15, 2025 17:03:08.203958988 CET4455031984.75.149.2192.168.2.4
                                                                  Jan 15, 2025 17:03:08.222729921 CET4455031884.75.149.2192.168.2.4
                                                                  Jan 15, 2025 17:03:08.222795010 CET50318445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:08.532632113 CET50340445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:03:08.537442923 CET44550340108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.537504911 CET50340445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:03:08.537693024 CET50340445192.168.2.4108.104.123.1
                                                                  Jan 15, 2025 17:03:08.542432070 CET44550340108.104.123.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.699609995 CET4455007440.24.94.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.699666023 CET50074445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:03:08.699697971 CET50074445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:03:08.699736118 CET50074445192.168.2.440.24.94.1
                                                                  Jan 15, 2025 17:03:08.704473972 CET4455007440.24.94.1192.168.2.4
                                                                  Jan 15, 2025 17:03:08.704483986 CET4455007440.24.94.1192.168.2.4
                                                                  Jan 15, 2025 17:03:10.105848074 CET4455007573.4.193.1192.168.2.4
                                                                  Jan 15, 2025 17:03:10.105922937 CET50075445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:03:10.138411999 CET44550078169.137.120.1192.168.2.4
                                                                  Jan 15, 2025 17:03:10.138485909 CET50078445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:03:10.800944090 CET50111445192.168.2.4119.163.139.1
                                                                  Jan 15, 2025 17:03:10.800977945 CET50116445192.168.2.4178.206.229.1
                                                                  Jan 15, 2025 17:03:10.801027060 CET50174445192.168.2.4180.212.215.2
                                                                  Jan 15, 2025 17:03:10.801143885 CET50147445192.168.2.491.148.191.2
                                                                  Jan 15, 2025 17:03:10.801166058 CET50082445192.168.2.4156.251.148.1
                                                                  Jan 15, 2025 17:03:10.801193953 CET50206445192.168.2.4159.109.196.2
                                                                  Jan 15, 2025 17:03:10.801238060 CET50075445192.168.2.473.4.193.1
                                                                  Jan 15, 2025 17:03:10.801255941 CET50087445192.168.2.423.77.54.2
                                                                  Jan 15, 2025 17:03:10.801296949 CET50252445192.168.2.448.26.87.2
                                                                  Jan 15, 2025 17:03:10.801327944 CET50078445192.168.2.4169.137.120.1
                                                                  Jan 15, 2025 17:03:10.801357031 CET50081445192.168.2.424.5.32.1
                                                                  Jan 15, 2025 17:03:10.801386118 CET50085445192.168.2.481.189.195.1
                                                                  Jan 15, 2025 17:03:10.801413059 CET50089445192.168.2.492.102.45.1
                                                                  Jan 15, 2025 17:03:10.801434994 CET50090445192.168.2.4103.135.215.1
                                                                  Jan 15, 2025 17:03:10.801522017 CET50098445192.168.2.4212.39.73.2
                                                                  Jan 15, 2025 17:03:10.801546097 CET50101445192.168.2.4211.237.66.1
                                                                  Jan 15, 2025 17:03:10.801574945 CET50102445192.168.2.4142.169.216.1
                                                                  Jan 15, 2025 17:03:10.801599979 CET50105445192.168.2.440.235.31.1
                                                                  Jan 15, 2025 17:03:10.801630020 CET50107445192.168.2.4145.201.0.2
                                                                  Jan 15, 2025 17:03:10.801652908 CET50110445192.168.2.44.147.179.1
                                                                  Jan 15, 2025 17:03:10.801682949 CET50119445192.168.2.426.97.17.1
                                                                  Jan 15, 2025 17:03:10.801737070 CET50121445192.168.2.447.77.228.2
                                                                  Jan 15, 2025 17:03:10.801770926 CET50144445192.168.2.438.46.21.2
                                                                  Jan 15, 2025 17:03:10.801788092 CET50130445192.168.2.4206.137.46.1
                                                                  Jan 15, 2025 17:03:10.801817894 CET50156445192.168.2.4130.53.73.1
                                                                  Jan 15, 2025 17:03:10.801847935 CET50149445192.168.2.4115.185.47.2
                                                                  Jan 15, 2025 17:03:10.801870108 CET50187445192.168.2.466.28.85.1
                                                                  Jan 15, 2025 17:03:10.801968098 CET50267445192.168.2.4116.97.98.1
                                                                  Jan 15, 2025 17:03:10.802104950 CET50319445192.168.2.484.75.149.2
                                                                  Jan 15, 2025 17:03:10.802139044 CET50340445192.168.2.4108.104.123.1
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 15, 2025 17:02:02.999711037 CET6054053192.168.2.41.1.1.1
                                                                  Jan 15, 2025 17:02:03.304775000 CET53605401.1.1.1192.168.2.4
                                                                  Jan 15, 2025 17:02:04.009777069 CET6166653192.168.2.41.1.1.1
                                                                  Jan 15, 2025 17:02:04.340010881 CET53616661.1.1.1192.168.2.4
                                                                  Jan 15, 2025 17:02:21.041610003 CET138138192.168.2.4192.168.2.255
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jan 15, 2025 17:02:02.999711037 CET192.168.2.41.1.1.10xdda2Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                                                  Jan 15, 2025 17:02:04.009777069 CET192.168.2.41.1.1.10xa1feStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 15, 2025 17:02:03.304775000 CET1.1.1.1192.168.2.40xdda2No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                                                  Jan 15, 2025 17:02:04.340010881 CET1.1.1.1192.168.2.40xa1feNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                                                  Jan 15, 2025 17:02:04.340010881 CET1.1.1.1192.168.2.40xa1feNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                                                  • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449730103.224.212.215807376C:\Windows\mssecsvr.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 15, 2025 17:02:03.317462921 CET100OUTGET / HTTP/1.1
                                                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  Cache-Control: no-cache
                                                                  Jan 15, 2025 17:02:04.003189087 CET365INHTTP/1.1 302 Found
                                                                  date: Wed, 15 Jan 2025 16:02:03 GMT
                                                                  server: Apache
                                                                  set-cookie: __tad=1736956923.6688295; expires=Sat, 13-Jan-2035 16:02:03 GMT; Max-Age=315360000
                                                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0391-8145-be822d640a38
                                                                  content-length: 2
                                                                  content-type: text/html; charset=UTF-8
                                                                  connection: close
                                                                  Data Raw: 0a 0a
                                                                  Data Ascii:


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.449731199.59.243.228807376C:\Windows\mssecsvr.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 15, 2025 17:02:04.367757082 CET169OUTGET /?subid1=20250116-0302-0391-8145-be822d640a38 HTTP/1.1
                                                                  Cache-Control: no-cache
                                                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  Connection: Keep-Alive
                                                                  Jan 15, 2025 17:02:04.879179001 CET1236INHTTP/1.1 200 OK
                                                                  date: Wed, 15 Jan 2025 16:02:04 GMT
                                                                  content-type: text/html; charset=utf-8
                                                                  content-length: 1262
                                                                  x-request-id: db512008-65d2-448a-b6b1-ea5977f3e3e8
                                                                  cache-control: no-store, max-age=0
                                                                  accept-ch: sec-ch-prefers-color-scheme
                                                                  critical-ch: sec-ch-prefers-color-scheme
                                                                  vary: sec-ch-prefers-color-scheme
                                                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_m+G01hv4g270HW1cvqigQC0PJkCQ8wWe9mFK8fdnQESpW4+gWFs4OunVP/iBqooJrt75DY4tlwUVQpwNMpVCnQ==
                                                                  set-cookie: parking_session=db512008-65d2-448a-b6b1-ea5977f3e3e8; expires=Wed, 15 Jan 2025 16:17:04 GMT; path=/
                                                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6d 2b 47 30 31 68 76 34 67 32 37 30 48 57 31 63 76 71 69 67 51 43 30 50 4a 6b 43 51 38 77 57 65 39 6d 46 4b 38 66 64 6e 51 45 53 70 57 34 2b 67 57 46 73 34 4f 75 6e 56 50 2f 69 42 71 6f 6f 4a 72 74 37 35 44 59 34 74 6c 77 55 56 51 70 77 4e 4d 70 56 43 6e 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_m+G01hv4g270HW1cvqigQC0PJkCQ8wWe9mFK8fdnQESpW4+gWFs4OunVP/iBqooJrt75DY4tlwUVQpwNMpVCnQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                                                  Jan 15, 2025 17:02:04.879224062 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                                                  Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZGI1MTIwMDgtNjVkMi00NDhhLWI2YjEtZWE1OTc3ZjNlM2U4IiwicGFnZV90aW1lIjoxNzM2OTU2OTI0LCJwYWdlX3VybCI6I


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.449732103.224.212.215807464C:\Windows\mssecsvr.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 15, 2025 17:02:05.063698053 CET100OUTGET / HTTP/1.1
                                                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  Cache-Control: no-cache
                                                                  Jan 15, 2025 17:02:05.681677103 CET365INHTTP/1.1 302 Found
                                                                  date: Wed, 15 Jan 2025 16:02:05 GMT
                                                                  server: Apache
                                                                  set-cookie: __tad=1736956925.4360378; expires=Sat, 13-Jan-2035 16:02:05 GMT; Max-Age=315360000
                                                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-05ad-88d9-dedd0360a734
                                                                  content-length: 2
                                                                  content-type: text/html; charset=UTF-8
                                                                  connection: close
                                                                  Data Raw: 0a 0a
                                                                  Data Ascii:


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.449733199.59.243.228807464C:\Windows\mssecsvr.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 15, 2025 17:02:05.696553946 CET169OUTGET /?subid1=20250116-0302-05ad-88d9-dedd0360a734 HTTP/1.1
                                                                  Cache-Control: no-cache
                                                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  Connection: Keep-Alive
                                                                  Jan 15, 2025 17:02:06.161392927 CET1236INHTTP/1.1 200 OK
                                                                  date: Wed, 15 Jan 2025 16:02:05 GMT
                                                                  content-type: text/html; charset=utf-8
                                                                  content-length: 1262
                                                                  x-request-id: e06efaa0-e5b7-4ec3-9e3e-f3a63bc2df7b
                                                                  cache-control: no-store, max-age=0
                                                                  accept-ch: sec-ch-prefers-color-scheme
                                                                  critical-ch: sec-ch-prefers-color-scheme
                                                                  vary: sec-ch-prefers-color-scheme
                                                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_oUH218JeXL5r3knxuwexUNbwZW8eSJy0WZLsY83QiVlVHQ3M74mlZ7pp83LHMEuHfgy3ROn9kVvsPCoVr4jQfg==
                                                                  set-cookie: parking_session=e06efaa0-e5b7-4ec3-9e3e-f3a63bc2df7b; expires=Wed, 15 Jan 2025 16:17:06 GMT; path=/
                                                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6f 55 48 32 31 38 4a 65 58 4c 35 72 33 6b 6e 78 75 77 65 78 55 4e 62 77 5a 57 38 65 53 4a 79 30 57 5a 4c 73 59 38 33 51 69 56 6c 56 48 51 33 4d 37 34 6d 6c 5a 37 70 70 38 33 4c 48 4d 45 75 48 66 67 79 33 52 4f 6e 39 6b 56 76 73 50 43 6f 56 72 34 6a 51 66 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_oUH218JeXL5r3knxuwexUNbwZW8eSJy0WZLsY83QiVlVHQ3M74mlZ7pp83LHMEuHfgy3ROn9kVvsPCoVr4jQfg==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                                                  Jan 15, 2025 17:02:06.161482096 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                                                  Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZTA2ZWZhYTAtZTViNy00ZWMzLTllM2UtZjNhNjNiYzJkZjdiIiwicGFnZV90aW1lIjoxNzM2OTU2OTI2LCJwYWdlX3VybCI6I


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.449734103.224.212.215807516C:\Windows\mssecsvr.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 15, 2025 17:02:05.779393911 CET134OUTGET / HTTP/1.1
                                                                  Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  Cache-Control: no-cache
                                                                  Cookie: __tad=1736956923.6688295
                                                                  Jan 15, 2025 17:02:06.424515009 CET269INHTTP/1.1 302 Found
                                                                  date: Wed, 15 Jan 2025 16:02:06 GMT
                                                                  server: Apache
                                                                  location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0302-0618-947e-8a073fcf7910
                                                                  content-length: 2
                                                                  content-type: text/html; charset=UTF-8
                                                                  connection: close
                                                                  Data Raw: 0a 0a
                                                                  Data Ascii:


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.449744199.59.243.228807516C:\Windows\mssecsvr.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 15, 2025 17:02:06.437876940 CET231OUTGET /?subid1=20250116-0302-0618-947e-8a073fcf7910 HTTP/1.1
                                                                  Cache-Control: no-cache
                                                                  Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                  Connection: Keep-Alive
                                                                  Cookie: parking_session=db512008-65d2-448a-b6b1-ea5977f3e3e8
                                                                  Jan 15, 2025 17:02:06.915353060 CET1236INHTTP/1.1 200 OK
                                                                  date: Wed, 15 Jan 2025 16:02:06 GMT
                                                                  content-type: text/html; charset=utf-8
                                                                  content-length: 1262
                                                                  x-request-id: 29fd841e-6f86-4fca-bfde-97483011a99a
                                                                  cache-control: no-store, max-age=0
                                                                  accept-ch: sec-ch-prefers-color-scheme
                                                                  critical-ch: sec-ch-prefers-color-scheme
                                                                  vary: sec-ch-prefers-color-scheme
                                                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_e70aCBZ6UEc1MwS/Ahfh9HCk3Nzkuq2F5YqKS8h3Cm6eWZkZb/KFXAA1k5zYZUPbTRrdPzJCcznt4yYu8wxBVQ==
                                                                  set-cookie: parking_session=db512008-65d2-448a-b6b1-ea5977f3e3e8; expires=Wed, 15 Jan 2025 16:17:06 GMT
                                                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 65 37 30 61 43 42 5a 36 55 45 63 31 4d 77 53 2f 41 68 66 68 39 48 43 6b 33 4e 7a 6b 75 71 32 46 35 59 71 4b 53 38 68 33 43 6d 36 65 57 5a 6b 5a 62 2f 4b 46 58 41 41 31 6b 35 7a 59 5a 55 50 62 54 52 72 64 50 7a 4a 43 63 7a 6e 74 34 79 59 75 38 77 78 42 56 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                                  Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_e70aCBZ6UEc1MwS/Ahfh9HCk3Nzkuq2F5YqKS8h3Cm6eWZkZb/KFXAA1k5zYZUPbTRrdPzJCcznt4yYu8wxBVQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                                                  Jan 15, 2025 17:02:06.915380955 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                                                  Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZGI1MTIwMDgtNjVkMi00NDhhLWI2YjEtZWE1OTc3ZjNlM2U4IiwicGFnZV90aW1lIjoxNzM2OTU2OTI2LCJwYWdlX3VybCI6Imh0dHA6L


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:11:02:01
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\System32\loaddll32.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll"
                                                                  Imagebase:0x990000
                                                                  File size:126'464 bytes
                                                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:11:02:01
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:11:02:01
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1
                                                                  Imagebase:0x240000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:11:02:01
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\zTrDsX9gXl.dll,PlayGame
                                                                  Imagebase:0xe20000
                                                                  File size:61'440 bytes
                                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:11:02:01
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",#1
                                                                  Imagebase:0xe20000
                                                                  File size:61'440 bytes
                                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:11:02:01
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\mssecsvr.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\WINDOWS\mssecsvr.exe
                                                                  Imagebase:0x400000
                                                                  File size:3'723'264 bytes
                                                                  MD5 hash:DE6BCE2486E432A4B5B864474C28115A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1703910829.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1704036895.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1704036895.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:11:02:03
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\mssecsvr.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                                                  Imagebase:0x400000
                                                                  File size:3'723'264 bytes
                                                                  MD5 hash:DE6BCE2486E432A4B5B864474C28115A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1724997765.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2376217679.00000000023E6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2376217679.00000000023E6000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1725332071.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1725332071.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2375884712.0000000001EB5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2375884712.0000000001EB5000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:11:02:04
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\zTrDsX9gXl.dll",PlayGame
                                                                  Imagebase:0xe20000
                                                                  File size:61'440 bytes
                                                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:8
                                                                  Start time:11:02:04
                                                                  Start date:15/01/2025
                                                                  Path:C:\Windows\mssecsvr.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\WINDOWS\mssecsvr.exe
                                                                  Imagebase:0x400000
                                                                  File size:3'723'264 bytes
                                                                  MD5 hash:DE6BCE2486E432A4B5B864474C28115A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1749587403.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1732224157.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1732331074.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1732331074.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                  • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1749794760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                  • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1749794760.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:71.7%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:63.2%
                                                                    Total number of Nodes:38
                                                                    Total number of Limit Nodes:9
                                                                    execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                                                    Callgraph

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                                    • sprintf.MSVCRT ref: 00407E01
                                                                    • sprintf.MSVCRT ref: 00407E18
                                                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                                    • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                                    • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                                    • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                                    • CreateProcessA.KERNELBASE ref: 00407EE8
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                                    • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1738084295.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.1738066618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738105541.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738173991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                                    • API String ID: 4281112323-1507730452
                                                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1738084295.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.1738066618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738105541.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738173991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                    • String ID:
                                                                    • API String ID: 801014965-0
                                                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                                    Strings
                                                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1738084295.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.1738066618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738105541.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738173991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                    • API String ID: 774561529-2614457033
                                                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • sprintf.MSVCRT ref: 00407C56
                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1738084295.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.1738066618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738105541.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738173991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                                    • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                                                    • API String ID: 3340711343-2450984573
                                                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                    • __p___argc.MSVCRT ref: 004080A5
                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1738084295.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.1738066618.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738105541.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738124272.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738173991.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.1738258920.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                                    • String ID: mssecsvc2.1
                                                                    • API String ID: 4274534310-2839763450
                                                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                                    Execution Graph

                                                                    Execution Coverage:34.8%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:36
                                                                    Total number of Limit Nodes:2

                                                                    Callgraph

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                    • __p___argc.MSVCRT ref: 004080A5
                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                                    • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                                    • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.2374870345.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.2374857346.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374884524.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374945737.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374959580.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                                    • String ID: mssecsvc2.1
                                                                    • API String ID: 4274534310-2839763450
                                                                    • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                    • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                                    • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                                    • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                                    • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                                    • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                                      • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                                      • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                                    Strings
                                                                    • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.2374870345.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.2374857346.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374884524.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374945737.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374959580.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                                    • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                                    • API String ID: 774561529-2614457033
                                                                    • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                                    • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                                    • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                                    • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • sprintf.MSVCRT ref: 00407C56
                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                                    • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.2374870345.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.2374857346.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374884524.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374945737.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374959580.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                                    • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                                                    • API String ID: 3340711343-2450984573
                                                                    • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                    • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                                    • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                                    • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                                                    • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                                    • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                                    • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                                    • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                                    • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                                    • sprintf.MSVCRT ref: 00407E01
                                                                    • sprintf.MSVCRT ref: 00407E18
                                                                    • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.2374870345.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.2374857346.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374884524.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374945737.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374959580.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                                    • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                                    • API String ID: 4072214828-1507730452
                                                                    • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                    • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                                    • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                                    • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.2374870345.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.2374857346.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374884524.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374897480.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374932468.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374945737.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2374959580.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000006.00000002.2375049249.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                    • String ID:
                                                                    • API String ID: 801014965-0
                                                                    • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                    • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                                    • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                                    • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59