Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
q4e7rZQEkL.dll

Overview

General Information

Sample name:q4e7rZQEkL.dll
renamed because original name is a hash value
Original sample name:7e68310ee0953263920001de94841567.dll
Analysis ID:1592043
MD5:7e68310ee0953263920001de94841567
SHA1:b71441520e636ca9ccea84376fb42d0264c4d617
SHA256:1589160661b4ca1f6c9177214bd282fd724efadefe940730efa2a6dde9e0a00e
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6636 cmdline: loaddll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6804 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6880 cmdline: rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6832 cmdline: rundll32.exe C:\Users\user\Desktop\q4e7rZQEkL.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 6952 cmdline: C:\WINDOWS\mssecsvr.exe MD5: EDF4881B12065F814C90F9DC71BE9B62)
    • rundll32.exe (PID: 3684 cmdline: rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 5244 cmdline: C:\WINDOWS\mssecsvr.exe MD5: EDF4881B12065F814C90F9DC71BE9B62)
  • mssecsvr.exe (PID: 7128 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: EDF4881B12065F814C90F9DC71BE9B62)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
q4e7rZQEkL.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    q4e7rZQEkL.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    • 0x38b0a:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
    • 0x387e4:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
    • 0x383d0:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
    q4e7rZQEkL.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.1766760488.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000005.00000000.1725170395.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              6.2.mssecsvr.exe.1d44084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              5.0.mssecsvr.exe.7100a4.1.raw.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                5.0.mssecsvr.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                5.0.mssecsvr.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                5.0.mssecsvr.exe.7100a4.1.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
                • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
                • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
                Click to see the 117 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T17:39:10.442708+010028033043Unknown Traffic192.168.2.449730103.224.212.21580TCP
                2025-01-15T17:39:12.306476+010028033043Unknown Traffic192.168.2.449732103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T17:39:09.509359+010028300181A Network Trojan was detected192.168.2.4632601.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: q4e7rZQEkL.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283ae8Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef804Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111ddf5Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef8Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111ddAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283aAvira URL Cloud: Label: malware
                Source: q4e7rZQEkL.dllVirustotal: Detection: 90%Perma Link
                Source: q4e7rZQEkL.dllReversingLabs: Detection: 92%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                Source: q4e7rZQEkL.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: q4e7rZQEkL.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.4:63260 -> 1.1.1.1:53
                Source: global trafficTCP traffic: 192.168.2.4:52159 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0339-10de-bd4f-b194c111ddf5 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0339-12e8-a7c6-ba11581ef804 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736959150.4303657
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0339-12ec-b81e-7c389c283ae8 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=c8e9fa67-ff38-48a4-b918-ac053a75dcf3
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49732 -> 103.224.212.215:80
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.195
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.195
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.195
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.1
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.195
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.1
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.1
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.1
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.1
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.1
                Source: unknownTCP traffic detected without corresponding DNS query: 29.177.137.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.52
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.52
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.52
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.52
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.1
                Source: unknownTCP traffic detected without corresponding DNS query: 115.22.22.1
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.70
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.70
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.70
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.70
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 76.56.126.1
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.176
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.176
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.176
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.1
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.176
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.1
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.1
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.1
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.1
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.1
                Source: unknownTCP traffic detected without corresponding DNS query: 165.36.191.1
                Source: unknownTCP traffic detected without corresponding DNS query: 40.55.118.162
                Source: unknownTCP traffic detected without corresponding DNS query: 40.55.118.162
                Source: unknownTCP traffic detected without corresponding DNS query: 40.55.118.162
                Source: unknownTCP traffic detected without corresponding DNS query: 40.55.118.1
                Source: unknownTCP traffic detected without corresponding DNS query: 40.55.118.162
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0339-10de-bd4f-b194c111ddf5 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0339-12e8-a7c6-ba11581ef804 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736959150.4303657
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0339-12ec-b81e-7c389c283ae8 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=c8e9fa67-ff38-48a4-b918-ac053a75dcf3
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                Source: mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000A88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1762491581.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111dd
                Source: mssecsvr.exe, 00000006.00000003.1760599617.0000000000AC4000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000003.1760599617.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000AAB000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef8
                Source: mssecsvr.exe, 00000008.00000002.1767669227.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283a
                Source: q4e7rZQEkL.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000006.00000002.2397277086.0000000000A88000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1767669227.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/4
                Source: mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/d
                Source: mssecsvr.exe, 00000008.00000002.1767669227.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/j
                Source: mssecsvr.exe, 00000008.00000002.1767669227.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/o
                Source: mssecsvr.exe, 00000008.00000002.1767669227.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/w
                Source: mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comD
                Source: mssecsvr.exe, 00000006.00000002.2396694620.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: q4e7rZQEkL.dll, type: SAMPLE
                Source: Yara matchFile source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.229596c.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1d76128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1d53104.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1d44084.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.2272948.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.22638c8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.229596c.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1d76128.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.226e8e8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1d53104.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.1d4f0a4.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.2272948.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.1766760488.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.1725170395.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000000.1725354645.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1747794261.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1766902808.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1753881608.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2397891299.0000000002272000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1747920345.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1754163167.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2397614773.0000000001D53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6952, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 5244, type: MEMORYSTR

                System Summary

                barindex
                Source: q4e7rZQEkL.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: q4e7rZQEkL.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1d44084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.229596c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.229596c.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.229596c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.1d76128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1d76128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1d76128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.1d53104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1d53104.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.1d53104.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.22638c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1d44084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1d44084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.2272948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.2272948.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.2272948.9.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.22638c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.22638c8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.229596c.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.229596c.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.229596c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.1d76128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1d76128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1d76128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                Source: 6.2.mssecsvr.exe.226e8e8.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.226e8e8.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1d53104.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1d53104.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.1d4f0a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.1d4f0a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.2272948.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.2272948.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000005.00000000.1725354645.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.1766902808.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2397891299.0000000002272000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.1747920345.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.1754163167.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2397614773.0000000001D53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: q4e7rZQEkL.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: q4e7rZQEkL.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: q4e7rZQEkL.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1d44084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.229596c.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.229596c.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.229596c.8.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.1d76128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1d76128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1d76128.4.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.1d53104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1d53104.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.1d53104.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.22638c8.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1d44084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1d44084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.2272948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.2272948.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.2272948.9.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.22638c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.22638c8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.229596c.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.229596c.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.229596c.8.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.1d76128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1d76128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1d76128.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 5.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                Source: 6.2.mssecsvr.exe.226e8e8.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.226e8e8.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1d53104.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1d53104.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.1d4f0a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.1d4f0a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.2272948.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.2272948.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000005.00000000.1725354645.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.1766902808.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2397891299.0000000002272000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.1747920345.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.1754163167.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2397614773.0000000001D53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: q4e7rZQEkL.dllBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/1@2/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,5_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,5_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6664:120:WilError_03
                Source: q4e7rZQEkL.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\q4e7rZQEkL.dll,PlayGame
                Source: q4e7rZQEkL.dllVirustotal: Detection: 90%
                Source: q4e7rZQEkL.dllReversingLabs: Detection: 92%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\q4e7rZQEkL.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\q4e7rZQEkL.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: q4e7rZQEkL.dllStatic file information: File size 5267459 > 1048576
                Source: q4e7rZQEkL.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeCode function: 5_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 2416Thread sleep count: 91 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 2416Thread sleep time: -182000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 3612Thread sleep count: 128 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 3612Thread sleep count: 46 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 2416Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: Amcache.hve.5.drBinary or memory string: VMware
                Source: mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                Source: mssecsvr.exe, 00000008.00000002.1767669227.0000000000BDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: mssecsvr.exe, 00000005.00000002.1762491581.0000000000C26000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000A88000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000003.1760599617.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1767669227.0000000000C1F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.1767669227.0000000000C16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: mssecsvr.exe, 00000006.00000003.1760599617.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW)
                Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1Jump to behavior
                Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                11
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Rundll32
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592043 Sample: q4e7rZQEkL.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 29 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->29 31 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->31 33 77026.bodis.com 2->33 41 Suricata IDS alerts for network traffic 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 5 other signatures 2->47 8 mssecsvr.exe 12 2->8         started        12 loaddll32.exe 1 2->12         started        signatures3 process4 dnsIp5 35 192.168.2.102 unknown unknown 8->35 37 192.168.2.103 unknown unknown 8->37 39 98 other IPs or domains 8->39 49 Connects to many different private IPs via SMB (likely to spread or exploit) 8->49 51 Connects to many different private IPs (likely to spread or exploit) 8->51 14 rundll32.exe 12->14         started        17 rundll32.exe 12->17         started        19 cmd.exe 1 12->19         started        21 conhost.exe 12->21         started        signatures6 process7 signatures8 53 Drops executables to the windows directory (C:\Windows) and starts them 14->53 23 mssecsvr.exe 13 14->23         started        25 mssecsvr.exe 13 17->25         started        27 rundll32.exe 1 19->27         started        process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                q4e7rZQEkL.dll90%VirustotalBrowse
                q4e7rZQEkL.dll92%ReversingLabsWin32.Ransomware.WannaCry
                q4e7rZQEkL.dll100%AviraTR/Ransom.Gen
                q4e7rZQEkL.dll100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283ae8100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef804100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111ddf5100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef8100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111dd100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283a100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comD0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    high
                    ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283ae8false
                      • Avira URL Cloud: malware
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                        high
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef804false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111ddf5false
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/omssecsvr.exe, 00000008.00000002.1767669227.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/jmssecsvr.exe, 00000008.00000002.1767669227.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000A88000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comq4e7rZQEkL.dllfalse
                                high
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283amssecsvr.exe, 00000008.00000002.1767669227.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/dmssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://upx.sf.netAmcache.hve.5.drfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000006.00000002.2396694620.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/wmssecsvr.exe, 00000008.00000002.1767669227.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/4mssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comDmssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111ddmssecsvr.exe, 00000005.00000002.1762491581.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000005.00000002.1762491581.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef8mssecsvr.exe, 00000006.00000003.1760599617.0000000000AC4000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000003.1760599617.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000AAB000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2397277086.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          175.138.214.218
                                          unknownMalaysia
                                          4788TMNET-AS-APTMNetInternetServiceProviderMYfalse
                                          188.158.166.1
                                          unknownIran (ISLAMIC Republic Of)
                                          39501NGSASIRfalse
                                          25.8.63.166
                                          unknownUnited Kingdom
                                          7922COMCAST-7922USfalse
                                          54.76.228.176
                                          unknownUnited States
                                          16509AMAZON-02USfalse
                                          214.105.233.1
                                          unknownUnited States
                                          721DNIC-ASBLK-00721-00726USfalse
                                          61.126.105.30
                                          unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                          148.190.179.1
                                          unknownUnited States
                                          42652DELUNETDEfalse
                                          148.190.179.3
                                          unknownUnited States
                                          42652DELUNETDEfalse
                                          148.190.179.2
                                          unknownUnited States
                                          42652DELUNETDEfalse
                                          93.83.4.1
                                          unknownAustria
                                          8447TELEKOM-ATA1TelekomAustriaAGATfalse
                                          41.209.109.1
                                          unknownSudan
                                          15706SudatelSDfalse
                                          52.105.25.1
                                          unknownUnited States
                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          165.36.191.176
                                          unknownUnited States
                                          37053RSAWEB-ASZAfalse
                                          97.219.176.1
                                          unknownUnited States
                                          6167CELLCO-PARTUSfalse
                                          24.81.53.1
                                          unknownCanada
                                          6327SHAWCAfalse
                                          214.105.233.222
                                          unknownUnited States
                                          721DNIC-ASBLK-00721-00726USfalse
                                          47.235.125.2
                                          unknownUnited States
                                          45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                                          47.235.125.1
                                          unknownUnited States
                                          45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                                          92.29.141.21
                                          unknownUnited Kingdom
                                          13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBfalse
                                          24.81.53.215
                                          unknownCanada
                                          6327SHAWCAfalse
                                          32.240.226.1
                                          unknownUnited States
                                          2686ATGS-MMD-ASUSfalse
                                          206.193.176.1
                                          unknownUnited States
                                          2856BT-UK-ASBTnetUKRegionalnetworkGBfalse
                                          40.55.118.162
                                          unknownUnited States
                                          4249LILLY-ASUSfalse
                                          161.183.110.1
                                          unknownUnited States
                                          10695WAL-MARTUSfalse
                                          97.219.176.139
                                          unknownUnited States
                                          6167CELLCO-PARTUSfalse
                                          61.126.105.1
                                          unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                          IP
                                          192.168.2.148
                                          192.168.2.149
                                          192.168.2.146
                                          192.168.2.147
                                          192.168.2.140
                                          192.168.2.141
                                          192.168.2.144
                                          192.168.2.145
                                          192.168.2.142
                                          192.168.2.143
                                          192.168.2.159
                                          192.168.2.157
                                          192.168.2.158
                                          192.168.2.151
                                          192.168.2.152
                                          192.168.2.150
                                          192.168.2.155
                                          192.168.2.156
                                          192.168.2.153
                                          192.168.2.154
                                          192.168.2.126
                                          192.168.2.247
                                          192.168.2.127
                                          192.168.2.248
                                          192.168.2.124
                                          192.168.2.245
                                          192.168.2.125
                                          192.168.2.246
                                          192.168.2.128
                                          192.168.2.249
                                          192.168.2.129
                                          192.168.2.240
                                          192.168.2.122
                                          192.168.2.243
                                          192.168.2.123
                                          192.168.2.244
                                          192.168.2.120
                                          192.168.2.241
                                          192.168.2.121
                                          192.168.2.242
                                          192.168.2.97
                                          192.168.2.137
                                          192.168.2.96
                                          192.168.2.138
                                          192.168.2.99
                                          192.168.2.135
                                          192.168.2.98
                                          192.168.2.136
                                          192.168.2.139
                                          192.168.2.250
                                          192.168.2.130
                                          192.168.2.251
                                          192.168.2.91
                                          192.168.2.90
                                          192.168.2.93
                                          192.168.2.133
                                          192.168.2.254
                                          192.168.2.92
                                          192.168.2.134
                                          192.168.2.95
                                          192.168.2.131
                                          192.168.2.252
                                          192.168.2.94
                                          192.168.2.132
                                          192.168.2.253
                                          192.168.2.104
                                          192.168.2.225
                                          192.168.2.105
                                          192.168.2.226
                                          192.168.2.102
                                          192.168.2.223
                                          192.168.2.103
                                          192.168.2.224
                                          192.168.2.108
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1592043
                                          Start date and time:2025-01-15 17:38:12 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 4m 19s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:12
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:q4e7rZQEkL.dll
                                          renamed because original name is a hash value
                                          Original Sample Name:7e68310ee0953263920001de94841567.dll
                                          Detection:MAL
                                          Classification:mal100.rans.expl.evad.winDLL@18/1@2/100
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:Failed
                                          Cookbook Comments:
                                          • Found application associated with file extension: .dll
                                          • Stop behavior analysis, all processes terminated
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                          • Excluded IPs from analysis (whitelisted): 199.232.210.172, 2.23.77.188, 20.109.210.53, 13.107.246.45
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          11:39:11API Interceptor1x Sleep call for process: loaddll32.exe modified
                                          11:39:46API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          77026.bodis.comGn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comGn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          04Ct9PoJrL.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          AMAZON-02USfirstontario.docxGet hashmaliciousUnknownBrowse
                                          • 54.69.238.133
                                          ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                                          • 54.176.115.71
                                          bot.x86.elfGet hashmaliciousUnknownBrowse
                                          • 34.214.77.3
                                          bot.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 44.232.80.77
                                          bot.mips.elfGet hashmaliciousUnknownBrowse
                                          • 52.77.51.103
                                          bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 54.200.242.19
                                          bot.arm.elfGet hashmaliciousUnknownBrowse
                                          • 18.237.164.164
                                          bot.ppc.elfGet hashmaliciousUnknownBrowse
                                          • 52.60.154.184
                                          arm5.elfGet hashmaliciousMiraiBrowse
                                          • 108.148.111.227
                                          MDE_File_Sample_c404ec52446527b77da6860ca493ea2007ac03d5 (2).zipGet hashmaliciousUnknownBrowse
                                          • 44.242.27.200
                                          NGSASIRla.bot.arm5.elfGet hashmaliciousMiraiBrowse
                                          • 188.159.29.159
                                          botnet.spc.elfGet hashmaliciousMirai, MoobotBrowse
                                          • 188.159.29.184
                                          debug.elfGet hashmaliciousMiraiBrowse
                                          • 188.159.83.247
                                          mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 188.158.73.18
                                          sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 188.159.83.243
                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 188.159.83.240
                                          la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 89.165.62.180
                                          la.bot.arm5.elfGet hashmaliciousMiraiBrowse
                                          • 188.158.171.101
                                          la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                          • 188.159.83.254
                                          arm6.elfGet hashmaliciousUnknownBrowse
                                          • 188.159.83.231
                                          COMCAST-7922USGn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                          • 96.217.134.1
                                          zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                          • 73.4.193.160
                                          bot.x86.elfGet hashmaliciousUnknownBrowse
                                          • 73.238.166.144
                                          bot.spc.elfGet hashmaliciousUnknownBrowse
                                          • 73.81.79.182
                                          bot.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 25.43.128.193
                                          bot.mips.elfGet hashmaliciousUnknownBrowse
                                          • 25.152.125.12
                                          bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 67.168.47.59
                                          bot.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 98.63.246.100
                                          bot.arm7.elfGet hashmaliciousMiraiBrowse
                                          • 76.129.159.98
                                          bot.arm.elfGet hashmaliciousUnknownBrowse
                                          • 76.18.177.107
                                          TMNET-AS-APTMNetInternetServiceProviderMYarm5.elfGet hashmaliciousMiraiBrowse
                                          • 175.140.232.18
                                          xd.arm.elfGet hashmaliciousMiraiBrowse
                                          • 60.53.161.147
                                          spc.elfGet hashmaliciousMiraiBrowse
                                          • 60.54.15.5
                                          ppc.elfGet hashmaliciousMiraiBrowse
                                          • 175.140.44.177
                                          tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                                          • 1.32.83.1
                                          ppc.elfGet hashmaliciousUnknownBrowse
                                          • 115.132.43.30
                                          m68k.elfGet hashmaliciousUnknownBrowse
                                          • 1.9.41.161
                                          res.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 175.137.50.102
                                          res.x86.elfGet hashmaliciousUnknownBrowse
                                          • 210.195.145.51
                                          3.elfGet hashmaliciousUnknownBrowse
                                          • 115.133.136.236
                                          No context
                                          No context
                                          Process:C:\Windows\mssecsvr.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.4629497641186
                                          Encrypted:false
                                          SSDEEP:6144:8IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN2dwBCswSbn:BXD94+WlLZMM6YFHg+n
                                          MD5:E8EA45A95CAA2CC50752A9D533EC4738
                                          SHA1:4F02859175532C11FFA9366A706021002101054E
                                          SHA-256:E68EB96DA13C02DBB9E5DC54E3910DFD50943199E72ECA1ABFADC593F4CA0F03
                                          SHA-512:388B7980FB7699BD906E9BBC32596E32671EFDA78A0BEF150D6C8CA5D2E9BADBCBDF93CFF7994FC5D021ECBA11FED205939C818947A35831F61EEE0AFA9188AD
                                          Malicious:false
                                          Reputation:low
                                          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.I..lg..............................................................................................................................................................................................................................................................................................................................................T..5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):2.794461463359933
                                          TrID:
                                          • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                          • Generic Win/DOS Executable (2004/3) 0.20%
                                          • DOS Executable Generic (2002/1) 0.20%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:q4e7rZQEkL.dll
                                          File size:5'267'459 bytes
                                          MD5:7e68310ee0953263920001de94841567
                                          SHA1:b71441520e636ca9ccea84376fb42d0264c4d617
                                          SHA256:1589160661b4ca1f6c9177214bd282fd724efadefe940730efa2a6dde9e0a00e
                                          SHA512:3b8d2a1c38817204a11be05fb198b552d0a972555c635e2146bdd176255b14d4c403fa38eac161f4b03abcd1002119772a8b95786a2b0f28f6e4b32ded34f24a
                                          SSDEEP:24576:MbLguVQhfdmMSirYbcMNgef0QeQjGR012JCouYCQ0bzDkHfhD2xk:MnFQqMSPbcBVQeji86zw2xk
                                          TLSH:0C36CE46B394C669C02982798963C7E6A7B3BC455F32930B939C7B7F2E337806E15B11
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                          Icon Hash:7ae282899bbab082
                                          Entrypoint:0x100011e9
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x10000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                          DLL Characteristics:
                                          Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          push ebx
                                          mov ebx, dword ptr [ebp+08h]
                                          push esi
                                          mov esi, dword ptr [ebp+0Ch]
                                          push edi
                                          mov edi, dword ptr [ebp+10h]
                                          test esi, esi
                                          jne 00007FF6506DFE9Bh
                                          cmp dword ptr [10003140h], 00000000h
                                          jmp 00007FF6506DFEB8h
                                          cmp esi, 01h
                                          je 00007FF6506DFE97h
                                          cmp esi, 02h
                                          jne 00007FF6506DFEB4h
                                          mov eax, dword ptr [10003150h]
                                          test eax, eax
                                          je 00007FF6506DFE9Bh
                                          push edi
                                          push esi
                                          push ebx
                                          call eax
                                          test eax, eax
                                          je 00007FF6506DFE9Eh
                                          push edi
                                          push esi
                                          push ebx
                                          call 00007FF6506DFDAAh
                                          test eax, eax
                                          jne 00007FF6506DFE96h
                                          xor eax, eax
                                          jmp 00007FF6506DFEE0h
                                          push edi
                                          push esi
                                          push ebx
                                          call 00007FF6506DFC5Ch
                                          cmp esi, 01h
                                          mov dword ptr [ebp+0Ch], eax
                                          jne 00007FF6506DFE9Eh
                                          test eax, eax
                                          jne 00007FF6506DFEC9h
                                          push edi
                                          push eax
                                          push ebx
                                          call 00007FF6506DFD86h
                                          test esi, esi
                                          je 00007FF6506DFE97h
                                          cmp esi, 03h
                                          jne 00007FF6506DFEB8h
                                          push edi
                                          push esi
                                          push ebx
                                          call 00007FF6506DFD75h
                                          test eax, eax
                                          jne 00007FF6506DFE95h
                                          and dword ptr [ebp+0Ch], eax
                                          cmp dword ptr [ebp+0Ch], 00000000h
                                          je 00007FF6506DFEA3h
                                          mov eax, dword ptr [10003150h]
                                          test eax, eax
                                          je 00007FF6506DFE9Ah
                                          push edi
                                          push esi
                                          push ebx
                                          call eax
                                          mov dword ptr [ebp+0Ch], eax
                                          mov eax, dword ptr [ebp+0Ch]
                                          pop edi
                                          pop esi
                                          pop ebx
                                          pop ebp
                                          retn 000Ch
                                          jmp dword ptr [10002028h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          Programming Language:
                                          • [ C ] VS98 (6.0) build 8168
                                          • [C++] VS98 (6.0) build 8168
                                          • [RES] VS98 (6.0) cvtres build 1720
                                          • [LNK] VS98 (6.0) imp/exp build 8168
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x40000x5000600x50100067cf1b93d63d0336e1ea5fcb5eb5db7aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          W0x40600x500000dataEnglishUnited States0.8100900650024414
                                          DLLImport
                                          KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                          MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                          NameOrdinalAddress
                                          PlayGame10x10001114
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2025-01-15T17:39:09.509359+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.4632601.1.1.153UDP
                                          2025-01-15T17:39:10.442708+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449730103.224.212.21580TCP
                                          2025-01-15T17:39:12.306476+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449732103.224.212.21580TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 15, 2025 17:39:09.826550007 CET4973080192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:09.831492901 CET8049730103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:09.831569910 CET4973080192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:09.831712008 CET4973080192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:09.836491108 CET8049730103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:09.948146105 CET49675443192.168.2.4173.222.162.32
                                          Jan 15, 2025 17:39:10.442640066 CET8049730103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:10.442708015 CET4973080192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:10.442856073 CET8049730103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:10.442914963 CET4973080192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:10.447253942 CET4973080192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:10.452075958 CET8049730103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:11.002141953 CET4973180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:11.007296085 CET8049731199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:11.007394075 CET4973180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:11.010627031 CET4973180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:11.015469074 CET8049731199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:11.495743990 CET8049731199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:11.495795965 CET8049731199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:11.495845079 CET4973180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:11.495887995 CET4973180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:11.503052950 CET4973180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:11.503089905 CET4973180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:11.675165892 CET4973280192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:11.680324078 CET8049732103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:11.680424929 CET4973280192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:11.680569887 CET4973280192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:11.685446978 CET8049732103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.306335926 CET8049732103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.306386948 CET8049732103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.306476116 CET4973280192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:12.309724092 CET4973280192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:12.311461926 CET4973380192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.314810991 CET8049732103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.316551924 CET8049733199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:12.318926096 CET4973480192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:12.318978071 CET4973380192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.319102049 CET4973380192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.324009895 CET8049734103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.324038982 CET8049733199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:12.324183941 CET4973480192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:12.324337959 CET4973480192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:12.329294920 CET8049734103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.802174091 CET8049733199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:12.802228928 CET8049733199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:12.802268028 CET4973380192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.802335978 CET4973380192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.809156895 CET4973380192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.809220076 CET4973380192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.834068060 CET49735445192.168.2.429.177.137.195
                                          Jan 15, 2025 17:39:12.839060068 CET4454973529.177.137.195192.168.2.4
                                          Jan 15, 2025 17:39:12.839410067 CET49735445192.168.2.429.177.137.195
                                          Jan 15, 2025 17:39:12.840035915 CET49735445192.168.2.429.177.137.195
                                          Jan 15, 2025 17:39:12.840354919 CET49736445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:12.845000982 CET4454973529.177.137.195192.168.2.4
                                          Jan 15, 2025 17:39:12.845067024 CET49735445192.168.2.429.177.137.195
                                          Jan 15, 2025 17:39:12.845233917 CET4454973629.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:12.845297098 CET49736445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:12.845405102 CET49736445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:12.850323915 CET4454973629.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:12.850373983 CET49736445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:12.870320082 CET49737445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:12.875257969 CET4454973729.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:12.891504049 CET49737445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:12.891814947 CET49737445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:12.896687031 CET4454973729.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:12.943775892 CET8049734103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.943902969 CET8049734103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.943986893 CET4973480192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:12.945971966 CET4973480192.168.2.4103.224.212.215
                                          Jan 15, 2025 17:39:12.946897984 CET4974180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.950860977 CET8049734103.224.212.215192.168.2.4
                                          Jan 15, 2025 17:39:12.952692986 CET8049741199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:12.952759027 CET4974180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.952877998 CET4974180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:12.957675934 CET8049741199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:13.428018093 CET8049741199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:13.428070068 CET8049741199.59.243.228192.168.2.4
                                          Jan 15, 2025 17:39:13.428103924 CET4974180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:13.428150892 CET4974180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:13.434755087 CET4974180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:13.434772968 CET4974180192.168.2.4199.59.243.228
                                          Jan 15, 2025 17:39:14.840290070 CET49761445192.168.2.4115.22.22.52
                                          Jan 15, 2025 17:39:14.845532894 CET44549761115.22.22.52192.168.2.4
                                          Jan 15, 2025 17:39:14.845628023 CET49761445192.168.2.4115.22.22.52
                                          Jan 15, 2025 17:39:14.845686913 CET49761445192.168.2.4115.22.22.52
                                          Jan 15, 2025 17:39:14.846513987 CET49762445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:14.850703001 CET44549761115.22.22.52192.168.2.4
                                          Jan 15, 2025 17:39:14.850769997 CET49761445192.168.2.4115.22.22.52
                                          Jan 15, 2025 17:39:14.851423025 CET44549762115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:14.851492882 CET49762445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:14.851556063 CET49762445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:14.852912903 CET49763445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:14.856571913 CET44549762115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:14.856642008 CET49762445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:14.857821941 CET44549763115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:14.857902050 CET49763445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:14.857944965 CET49763445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:14.862787962 CET44549763115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:16.855618954 CET49786445192.168.2.476.56.126.70
                                          Jan 15, 2025 17:39:16.860965014 CET4454978676.56.126.70192.168.2.4
                                          Jan 15, 2025 17:39:16.861064911 CET49786445192.168.2.476.56.126.70
                                          Jan 15, 2025 17:39:16.861120939 CET49786445192.168.2.476.56.126.70
                                          Jan 15, 2025 17:39:16.861346006 CET49787445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:16.866204023 CET4454978776.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:16.866262913 CET4454978676.56.126.70192.168.2.4
                                          Jan 15, 2025 17:39:16.866314888 CET49787445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:16.866342068 CET49787445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:16.866342068 CET49786445192.168.2.476.56.126.70
                                          Jan 15, 2025 17:39:16.868247032 CET49788445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:16.871380091 CET4454978776.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:16.871464968 CET49787445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:16.873143911 CET4454978876.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:16.873203993 CET49788445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:16.873265028 CET49788445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:16.878061056 CET4454978876.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:18.871581078 CET49811445192.168.2.4165.36.191.176
                                          Jan 15, 2025 17:39:18.876421928 CET44549811165.36.191.176192.168.2.4
                                          Jan 15, 2025 17:39:18.880508900 CET49811445192.168.2.4165.36.191.176
                                          Jan 15, 2025 17:39:18.880639076 CET49811445192.168.2.4165.36.191.176
                                          Jan 15, 2025 17:39:18.880944014 CET49812445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:18.885567904 CET44549811165.36.191.176192.168.2.4
                                          Jan 15, 2025 17:39:18.885633945 CET49811445192.168.2.4165.36.191.176
                                          Jan 15, 2025 17:39:18.885695934 CET44549812165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:18.885756969 CET49812445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:18.885824919 CET49812445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:18.887772083 CET49813445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:18.890742064 CET44549812165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:18.890886068 CET49812445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:18.892618895 CET44549813165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:18.892683029 CET49813445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:18.892729998 CET49813445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:18.897442102 CET44549813165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:20.913594007 CET49833445192.168.2.440.55.118.162
                                          Jan 15, 2025 17:39:20.918771029 CET4454983340.55.118.162192.168.2.4
                                          Jan 15, 2025 17:39:20.918884039 CET49833445192.168.2.440.55.118.162
                                          Jan 15, 2025 17:39:20.918951988 CET49833445192.168.2.440.55.118.162
                                          Jan 15, 2025 17:39:20.919194937 CET49834445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:20.924328089 CET4454983340.55.118.162192.168.2.4
                                          Jan 15, 2025 17:39:20.924360991 CET4454983440.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:20.924412966 CET49833445192.168.2.440.55.118.162
                                          Jan 15, 2025 17:39:20.924457073 CET49834445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:20.924514055 CET49834445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:20.925504923 CET49835445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:20.929620981 CET4454983440.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:20.929683924 CET49834445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:20.930341005 CET4454983540.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:20.930404902 CET49835445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:20.930457115 CET49835445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:20.935353994 CET4454983540.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:22.918495893 CET49857445192.168.2.4148.190.179.3
                                          Jan 15, 2025 17:39:22.923655987 CET44549857148.190.179.3192.168.2.4
                                          Jan 15, 2025 17:39:22.923749924 CET49857445192.168.2.4148.190.179.3
                                          Jan 15, 2025 17:39:22.923806906 CET49857445192.168.2.4148.190.179.3
                                          Jan 15, 2025 17:39:22.924036980 CET49858445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:22.928921938 CET44549858148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:22.929043055 CET49858445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:22.929043055 CET49858445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:22.929286957 CET44549857148.190.179.3192.168.2.4
                                          Jan 15, 2025 17:39:22.929801941 CET49857445192.168.2.4148.190.179.3
                                          Jan 15, 2025 17:39:22.930107117 CET49859445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:22.934174061 CET44549858148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:22.934433937 CET49858445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:22.934931040 CET44549859148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:22.935019970 CET49859445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:22.935190916 CET49859445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:22.940148115 CET44549859148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:24.725575924 CET4972380192.168.2.4199.232.214.172
                                          Jan 15, 2025 17:39:24.730686903 CET8049723199.232.214.172192.168.2.4
                                          Jan 15, 2025 17:39:24.730737925 CET4972380192.168.2.4199.232.214.172
                                          Jan 15, 2025 17:39:24.932929993 CET49884445192.168.2.416.122.44.225
                                          Jan 15, 2025 17:39:24.938005924 CET4454988416.122.44.225192.168.2.4
                                          Jan 15, 2025 17:39:24.938251019 CET49884445192.168.2.416.122.44.225
                                          Jan 15, 2025 17:39:24.938251019 CET49884445192.168.2.416.122.44.225
                                          Jan 15, 2025 17:39:24.938431978 CET49886445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:24.943212986 CET4454988616.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:24.943272114 CET49886445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:24.943279028 CET4454988416.122.44.225192.168.2.4
                                          Jan 15, 2025 17:39:24.943331003 CET49884445192.168.2.416.122.44.225
                                          Jan 15, 2025 17:39:24.943411112 CET49886445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:24.943680048 CET49887445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:24.948384047 CET4454988616.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:24.948554993 CET49886445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:24.948564053 CET4454988716.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:24.948679924 CET49887445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:24.948679924 CET49887445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:24.953574896 CET4454988716.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:26.127474070 CET5215953192.168.2.41.1.1.1
                                          Jan 15, 2025 17:39:26.132447958 CET53521591.1.1.1192.168.2.4
                                          Jan 15, 2025 17:39:26.132512093 CET5215953192.168.2.41.1.1.1
                                          Jan 15, 2025 17:39:26.137356997 CET53521591.1.1.1192.168.2.4
                                          Jan 15, 2025 17:39:26.578939915 CET5215953192.168.2.41.1.1.1
                                          Jan 15, 2025 17:39:26.584100962 CET53521591.1.1.1192.168.2.4
                                          Jan 15, 2025 17:39:26.584177971 CET5215953192.168.2.41.1.1.1
                                          Jan 15, 2025 17:39:26.948628902 CET52168445192.168.2.4175.138.214.218
                                          Jan 15, 2025 17:39:26.953537941 CET44552168175.138.214.218192.168.2.4
                                          Jan 15, 2025 17:39:26.953608036 CET52168445192.168.2.4175.138.214.218
                                          Jan 15, 2025 17:39:26.953672886 CET52168445192.168.2.4175.138.214.218
                                          Jan 15, 2025 17:39:26.953958988 CET52169445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:26.958594084 CET44552168175.138.214.218192.168.2.4
                                          Jan 15, 2025 17:39:26.958673000 CET52168445192.168.2.4175.138.214.218
                                          Jan 15, 2025 17:39:26.958714008 CET44552169175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:26.958935022 CET52169445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:26.958978891 CET52169445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:26.959290028 CET52170445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:26.963850975 CET44552169175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:26.963933945 CET52169445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:26.964098930 CET44552170175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:26.964159012 CET52170445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:26.964185953 CET52170445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:26.968947887 CET44552170175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:28.964217901 CET52193445192.168.2.447.235.125.138
                                          Jan 15, 2025 17:39:28.969177961 CET4455219347.235.125.138192.168.2.4
                                          Jan 15, 2025 17:39:28.973275900 CET52193445192.168.2.447.235.125.138
                                          Jan 15, 2025 17:39:28.973340034 CET52193445192.168.2.447.235.125.138
                                          Jan 15, 2025 17:39:28.973489046 CET52194445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:28.978327990 CET4455219447.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:28.978400946 CET52194445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:28.978439093 CET4455219347.235.125.138192.168.2.4
                                          Jan 15, 2025 17:39:28.978480101 CET52194445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:28.978517056 CET52193445192.168.2.447.235.125.138
                                          Jan 15, 2025 17:39:28.978883982 CET52195445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:28.983377934 CET4455219447.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:28.983596087 CET52194445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:28.983663082 CET4455219547.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:28.983753920 CET52195445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:28.983808994 CET52195445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:28.988590002 CET4455219547.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:30.979644060 CET52218445192.168.2.4188.158.166.53
                                          Jan 15, 2025 17:39:30.984460115 CET44552218188.158.166.53192.168.2.4
                                          Jan 15, 2025 17:39:30.984565973 CET52218445192.168.2.4188.158.166.53
                                          Jan 15, 2025 17:39:30.984600067 CET52218445192.168.2.4188.158.166.53
                                          Jan 15, 2025 17:39:30.984703064 CET52219445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:30.989494085 CET44552219188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:30.989558935 CET52219445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:30.989573956 CET52219445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:30.989609003 CET44552218188.158.166.53192.168.2.4
                                          Jan 15, 2025 17:39:30.989943027 CET52218445192.168.2.4188.158.166.53
                                          Jan 15, 2025 17:39:30.989948034 CET52220445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:30.994690895 CET44552220188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:30.994792938 CET52220445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:30.994792938 CET52220445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:30.995141029 CET44552219188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:30.995462894 CET52219445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:30.999613047 CET44552220188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:32.995898008 CET52243445192.168.2.452.105.25.84
                                          Jan 15, 2025 17:39:33.001422882 CET4455224352.105.25.84192.168.2.4
                                          Jan 15, 2025 17:39:33.001488924 CET52243445192.168.2.452.105.25.84
                                          Jan 15, 2025 17:39:33.001527071 CET52243445192.168.2.452.105.25.84
                                          Jan 15, 2025 17:39:33.001738071 CET52244445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:33.006691933 CET4455224452.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:33.006743908 CET4455224352.105.25.84192.168.2.4
                                          Jan 15, 2025 17:39:33.006768942 CET52244445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:33.006768942 CET52244445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:33.006798029 CET52243445192.168.2.452.105.25.84
                                          Jan 15, 2025 17:39:33.007034063 CET52245445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:33.011873007 CET4455224452.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:33.011883974 CET4455224552.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:33.011934996 CET52244445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:33.011957884 CET52245445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:33.011987925 CET52245445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:33.016732931 CET4455224552.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:34.275787115 CET4454973729.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:34.276017904 CET49737445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:34.276019096 CET49737445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:34.276019096 CET49737445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:34.281816959 CET4454973729.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:34.281826019 CET4454973729.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:35.010987043 CET52267445192.168.2.436.60.110.4
                                          Jan 15, 2025 17:39:35.015938997 CET4455226736.60.110.4192.168.2.4
                                          Jan 15, 2025 17:39:35.016020060 CET52267445192.168.2.436.60.110.4
                                          Jan 15, 2025 17:39:35.016086102 CET52267445192.168.2.436.60.110.4
                                          Jan 15, 2025 17:39:35.016223907 CET52268445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:35.021111012 CET4455226836.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:35.021173000 CET52268445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:35.021184921 CET52268445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:35.021435022 CET52269445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:35.022254944 CET4455226736.60.110.4192.168.2.4
                                          Jan 15, 2025 17:39:35.022299051 CET52267445192.168.2.436.60.110.4
                                          Jan 15, 2025 17:39:35.026235104 CET4455226936.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:35.026318073 CET52269445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:35.026362896 CET52269445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:35.027492046 CET4455226836.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:35.028429031 CET4455226836.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:35.028465986 CET52268445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:35.031151056 CET4455226936.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:36.226794004 CET44549763115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:36.226861954 CET49763445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:36.226918936 CET49763445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:36.226955891 CET49763445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:36.231686115 CET44549763115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:36.231863976 CET44549763115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:37.102067947 CET52292445192.168.2.432.240.226.83
                                          Jan 15, 2025 17:39:37.300954103 CET4455229232.240.226.83192.168.2.4
                                          Jan 15, 2025 17:39:37.301032066 CET52292445192.168.2.432.240.226.83
                                          Jan 15, 2025 17:39:37.317495108 CET52292445192.168.2.432.240.226.83
                                          Jan 15, 2025 17:39:37.317816973 CET52293445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:37.317970991 CET52294445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:37.322428942 CET4455229232.240.226.83192.168.2.4
                                          Jan 15, 2025 17:39:37.322494984 CET52292445192.168.2.432.240.226.83
                                          Jan 15, 2025 17:39:37.322648048 CET4455229332.240.226.1192.168.2.4
                                          Jan 15, 2025 17:39:37.322756052 CET4455229429.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:37.322797060 CET52294445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:37.322812080 CET52293445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:37.346872091 CET52293445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:37.346972942 CET52294445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:37.347851038 CET52296445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:37.351772070 CET4455229332.240.226.1192.168.2.4
                                          Jan 15, 2025 17:39:37.351797104 CET4455229429.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:37.351829052 CET52293445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:37.352730036 CET4455229632.240.226.1192.168.2.4
                                          Jan 15, 2025 17:39:37.352802992 CET52296445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:37.352853060 CET52296445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:37.357636929 CET4455229632.240.226.1192.168.2.4
                                          Jan 15, 2025 17:39:38.228914976 CET4454978876.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:38.228985071 CET49788445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:38.229046106 CET49788445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:38.229099035 CET49788445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:38.233820915 CET4454978876.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:38.233870029 CET4454978876.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:39.107980967 CET52297445192.168.2.454.76.228.176
                                          Jan 15, 2025 17:39:39.113305092 CET4455229754.76.228.176192.168.2.4
                                          Jan 15, 2025 17:39:39.115557909 CET52297445192.168.2.454.76.228.176
                                          Jan 15, 2025 17:39:39.115557909 CET52297445192.168.2.454.76.228.176
                                          Jan 15, 2025 17:39:39.115822077 CET52298445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:39:39.120841026 CET4455229854.76.228.1192.168.2.4
                                          Jan 15, 2025 17:39:39.121089935 CET4455229754.76.228.176192.168.2.4
                                          Jan 15, 2025 17:39:39.121186018 CET52297445192.168.2.454.76.228.176
                                          Jan 15, 2025 17:39:39.121186018 CET52298445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:39:39.121303082 CET52298445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:39:39.121572971 CET52299445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:39:39.126462936 CET4455229854.76.228.1192.168.2.4
                                          Jan 15, 2025 17:39:39.126476049 CET4455229954.76.228.1192.168.2.4
                                          Jan 15, 2025 17:39:39.126544952 CET52298445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:39:39.126574993 CET52299445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:39:39.132355928 CET52299445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:39:39.137300968 CET4455229954.76.228.1192.168.2.4
                                          Jan 15, 2025 17:39:39.230448008 CET52300445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:39.235407114 CET44552300115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:39.235630035 CET52300445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:39.235630035 CET52300445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:39:39.240633011 CET44552300115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:39:40.258080006 CET44549813165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:40.258164883 CET49813445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:40.258259058 CET49813445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:40.258313894 CET49813445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:40.263150930 CET44549813165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:40.263164043 CET44549813165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:41.120501995 CET52301445192.168.2.424.81.53.215
                                          Jan 15, 2025 17:39:41.125786066 CET4455230124.81.53.215192.168.2.4
                                          Jan 15, 2025 17:39:41.127415895 CET52301445192.168.2.424.81.53.215
                                          Jan 15, 2025 17:39:41.127477884 CET52301445192.168.2.424.81.53.215
                                          Jan 15, 2025 17:39:41.127579927 CET52302445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:39:41.132605076 CET4455230224.81.53.1192.168.2.4
                                          Jan 15, 2025 17:39:41.132638931 CET4455230124.81.53.215192.168.2.4
                                          Jan 15, 2025 17:39:41.132720947 CET52301445192.168.2.424.81.53.215
                                          Jan 15, 2025 17:39:41.132720947 CET52302445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:39:41.133073092 CET52302445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:39:41.133186102 CET52303445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:39:41.137929916 CET4455230224.81.53.1192.168.2.4
                                          Jan 15, 2025 17:39:41.138122082 CET4455230324.81.53.1192.168.2.4
                                          Jan 15, 2025 17:39:41.138186932 CET52302445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:39:41.138431072 CET52303445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:39:41.138431072 CET52303445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:39:41.143385887 CET4455230324.81.53.1192.168.2.4
                                          Jan 15, 2025 17:39:41.229756117 CET52304445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:41.234793901 CET4455230476.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:41.234864950 CET52304445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:41.234925985 CET52304445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:39:41.239804983 CET4455230476.56.126.1192.168.2.4
                                          Jan 15, 2025 17:39:42.338180065 CET4454983540.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:42.339102030 CET49835445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:42.339210987 CET49835445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:42.339234114 CET49835445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:42.344120979 CET4454983540.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:42.344139099 CET4454983540.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:43.136076927 CET52305445192.168.2.497.219.176.139
                                          Jan 15, 2025 17:39:43.141097069 CET4455230597.219.176.139192.168.2.4
                                          Jan 15, 2025 17:39:43.141166925 CET52305445192.168.2.497.219.176.139
                                          Jan 15, 2025 17:39:43.141246080 CET52305445192.168.2.497.219.176.139
                                          Jan 15, 2025 17:39:43.141381979 CET52306445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:39:43.146219015 CET4455230697.219.176.1192.168.2.4
                                          Jan 15, 2025 17:39:43.146271944 CET4455230597.219.176.139192.168.2.4
                                          Jan 15, 2025 17:39:43.146271944 CET52306445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:39:43.146325111 CET52306445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:39:43.146398067 CET52305445192.168.2.497.219.176.139
                                          Jan 15, 2025 17:39:43.146672964 CET52307445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:39:43.151345968 CET4455230697.219.176.1192.168.2.4
                                          Jan 15, 2025 17:39:43.151391983 CET52306445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:39:43.151559114 CET4455230797.219.176.1192.168.2.4
                                          Jan 15, 2025 17:39:43.151834011 CET52307445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:39:43.151834011 CET52307445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:39:43.156773090 CET4455230797.219.176.1192.168.2.4
                                          Jan 15, 2025 17:39:43.260961056 CET52308445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:43.266060114 CET44552308165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:43.266153097 CET52308445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:43.266191006 CET52308445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:39:43.270925999 CET44552308165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:39:44.287843943 CET44549859148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:44.287940025 CET49859445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:44.288098097 CET49859445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:44.288178921 CET49859445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:44.293473959 CET44549859148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:44.293505907 CET44549859148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:45.152406931 CET52309445192.168.2.439.117.145.22
                                          Jan 15, 2025 17:39:45.157548904 CET4455230939.117.145.22192.168.2.4
                                          Jan 15, 2025 17:39:45.157651901 CET52309445192.168.2.439.117.145.22
                                          Jan 15, 2025 17:39:45.157692909 CET52309445192.168.2.439.117.145.22
                                          Jan 15, 2025 17:39:45.157854080 CET52310445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:39:45.163362026 CET4455231039.117.145.1192.168.2.4
                                          Jan 15, 2025 17:39:45.163379908 CET4455230939.117.145.22192.168.2.4
                                          Jan 15, 2025 17:39:45.163561106 CET52309445192.168.2.439.117.145.22
                                          Jan 15, 2025 17:39:45.163654089 CET52310445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:39:45.163654089 CET52310445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:39:45.163882017 CET52311445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:39:45.168855906 CET4455231039.117.145.1192.168.2.4
                                          Jan 15, 2025 17:39:45.168921947 CET52310445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:39:45.168977976 CET4455231139.117.145.1192.168.2.4
                                          Jan 15, 2025 17:39:45.169050932 CET52311445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:39:45.169106007 CET52311445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:39:45.173917055 CET4455231139.117.145.1192.168.2.4
                                          Jan 15, 2025 17:39:45.354975939 CET52312445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:45.359972000 CET4455231240.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:45.360054016 CET52312445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:45.360115051 CET52312445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:39:45.364986897 CET4455231240.55.118.1192.168.2.4
                                          Jan 15, 2025 17:39:46.287725925 CET4454988716.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:46.288005114 CET49887445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:46.288005114 CET49887445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:46.288005114 CET49887445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:46.293859005 CET4454988716.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:46.293873072 CET4454988716.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:47.167411089 CET52313445192.168.2.425.8.63.166
                                          Jan 15, 2025 17:39:47.172617912 CET4455231325.8.63.166192.168.2.4
                                          Jan 15, 2025 17:39:47.172704935 CET52313445192.168.2.425.8.63.166
                                          Jan 15, 2025 17:39:47.172744036 CET52313445192.168.2.425.8.63.166
                                          Jan 15, 2025 17:39:47.172954082 CET52314445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:39:47.177767992 CET4455231325.8.63.166192.168.2.4
                                          Jan 15, 2025 17:39:47.177819967 CET4455231425.8.63.1192.168.2.4
                                          Jan 15, 2025 17:39:47.177819967 CET52313445192.168.2.425.8.63.166
                                          Jan 15, 2025 17:39:47.177881956 CET52314445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:39:47.177961111 CET52314445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:39:47.178239107 CET52315445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:39:47.183058023 CET4455231525.8.63.1192.168.2.4
                                          Jan 15, 2025 17:39:47.183128119 CET52315445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:39:47.183171988 CET52315445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:39:47.183353901 CET4455231425.8.63.1192.168.2.4
                                          Jan 15, 2025 17:39:47.183423042 CET52314445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:39:47.187941074 CET4455231525.8.63.1192.168.2.4
                                          Jan 15, 2025 17:39:47.292119026 CET52316445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:47.296977043 CET44552316148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:47.297049046 CET52316445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:47.297084093 CET52316445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:39:47.301843882 CET44552316148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:39:48.351097107 CET44552170175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:48.351165056 CET52170445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:48.351233959 CET52170445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:48.351401091 CET52170445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:48.356003046 CET44552170175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:48.356215954 CET44552170175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:49.042843103 CET52317445192.168.2.489.237.246.50
                                          Jan 15, 2025 17:39:49.047895908 CET4455231789.237.246.50192.168.2.4
                                          Jan 15, 2025 17:39:49.048105001 CET52317445192.168.2.489.237.246.50
                                          Jan 15, 2025 17:39:49.048105001 CET52317445192.168.2.489.237.246.50
                                          Jan 15, 2025 17:39:49.048248053 CET52318445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:39:49.054074049 CET4455231889.237.246.1192.168.2.4
                                          Jan 15, 2025 17:39:49.054142952 CET52318445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:39:49.054228067 CET52318445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:39:49.054677963 CET52319445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:39:49.055161953 CET4455231789.237.246.50192.168.2.4
                                          Jan 15, 2025 17:39:49.055392981 CET52317445192.168.2.489.237.246.50
                                          Jan 15, 2025 17:39:49.059580088 CET4455231889.237.246.1192.168.2.4
                                          Jan 15, 2025 17:39:49.059590101 CET4455231989.237.246.1192.168.2.4
                                          Jan 15, 2025 17:39:49.059819937 CET52319445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:39:49.059819937 CET52319445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:39:49.063262939 CET4455231889.237.246.1192.168.2.4
                                          Jan 15, 2025 17:39:49.063417912 CET52318445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:39:49.064639091 CET4455231989.237.246.1192.168.2.4
                                          Jan 15, 2025 17:39:49.292104006 CET52320445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:49.298428059 CET4455232016.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:49.298510075 CET52320445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:49.298593998 CET52320445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:39:49.303384066 CET4455232016.122.44.1192.168.2.4
                                          Jan 15, 2025 17:39:50.371376991 CET4455219547.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:50.371596098 CET52195445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:50.371695042 CET52195445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:50.371726036 CET52195445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:50.376513004 CET4455219547.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:50.376522064 CET4455219547.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:50.792915106 CET52321445192.168.2.493.83.4.160
                                          Jan 15, 2025 17:39:50.797909021 CET4455232193.83.4.160192.168.2.4
                                          Jan 15, 2025 17:39:50.798043013 CET52321445192.168.2.493.83.4.160
                                          Jan 15, 2025 17:39:50.798077106 CET52321445192.168.2.493.83.4.160
                                          Jan 15, 2025 17:39:50.798286915 CET52322445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:39:50.803226948 CET4455232293.83.4.1192.168.2.4
                                          Jan 15, 2025 17:39:50.803292036 CET4455232193.83.4.160192.168.2.4
                                          Jan 15, 2025 17:39:50.803294897 CET52322445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:39:50.803323030 CET52322445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:39:50.803397894 CET52321445192.168.2.493.83.4.160
                                          Jan 15, 2025 17:39:50.803730011 CET52323445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:39:50.808444977 CET4455232293.83.4.1192.168.2.4
                                          Jan 15, 2025 17:39:50.808490038 CET52322445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:39:50.808521986 CET4455232393.83.4.1192.168.2.4
                                          Jan 15, 2025 17:39:50.808679104 CET52323445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:39:50.808680058 CET52323445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:39:50.813704967 CET4455232393.83.4.1192.168.2.4
                                          Jan 15, 2025 17:39:51.354531050 CET52324445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:51.359538078 CET44552324175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:51.359625101 CET52324445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:51.359659910 CET52324445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:39:51.364569902 CET44552324175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:39:52.433180094 CET52325445192.168.2.4161.183.110.166
                                          Jan 15, 2025 17:39:52.573225021 CET44552220188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:52.573357105 CET52220445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:52.573357105 CET52220445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:52.573448896 CET52220445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:52.573877096 CET44552325161.183.110.166192.168.2.4
                                          Jan 15, 2025 17:39:52.575408936 CET52325445192.168.2.4161.183.110.166
                                          Jan 15, 2025 17:39:52.575484037 CET52325445192.168.2.4161.183.110.166
                                          Jan 15, 2025 17:39:52.575768948 CET52326445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:39:52.578289986 CET44552220188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:52.578299046 CET44552220188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:52.580368996 CET44552325161.183.110.166192.168.2.4
                                          Jan 15, 2025 17:39:52.580576897 CET44552326161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:39:52.580673933 CET52326445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:39:52.580730915 CET52325445192.168.2.4161.183.110.166
                                          Jan 15, 2025 17:39:52.580760956 CET52326445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:39:52.581051111 CET52327445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:39:52.585838079 CET44552326161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:39:52.585848093 CET44552327161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:39:52.585916996 CET52327445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:39:52.585957050 CET52327445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:39:52.586040020 CET52326445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:39:52.590935946 CET44552327161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:39:53.386027098 CET52328445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:53.391001940 CET4455232847.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:53.391094923 CET52328445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:53.391163111 CET52328445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:39:53.395973921 CET4455232847.235.125.1192.168.2.4
                                          Jan 15, 2025 17:39:53.964144945 CET52329445192.168.2.4155.214.228.235
                                          Jan 15, 2025 17:39:53.968940020 CET44552329155.214.228.235192.168.2.4
                                          Jan 15, 2025 17:39:53.969000101 CET52329445192.168.2.4155.214.228.235
                                          Jan 15, 2025 17:39:53.969047070 CET52329445192.168.2.4155.214.228.235
                                          Jan 15, 2025 17:39:53.969257116 CET52330445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:39:53.974014997 CET44552329155.214.228.235192.168.2.4
                                          Jan 15, 2025 17:39:53.974060059 CET52329445192.168.2.4155.214.228.235
                                          Jan 15, 2025 17:39:53.974159002 CET44552330155.214.228.1192.168.2.4
                                          Jan 15, 2025 17:39:53.974205017 CET52330445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:39:53.974292994 CET52330445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:39:53.974594116 CET52331445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:39:53.979223013 CET44552330155.214.228.1192.168.2.4
                                          Jan 15, 2025 17:39:53.979283094 CET52330445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:39:53.979387999 CET44552331155.214.228.1192.168.2.4
                                          Jan 15, 2025 17:39:53.979446888 CET52331445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:39:53.979481936 CET52331445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:39:53.984255075 CET44552331155.214.228.1192.168.2.4
                                          Jan 15, 2025 17:39:54.365881920 CET4455224552.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:54.369398117 CET52245445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:54.369436026 CET52245445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:54.369481087 CET52245445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:54.374696970 CET4455224552.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:54.374707937 CET4455224552.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:55.386980057 CET52332445192.168.2.4212.25.241.104
                                          Jan 15, 2025 17:39:55.392728090 CET44552332212.25.241.104192.168.2.4
                                          Jan 15, 2025 17:39:55.392829895 CET52332445192.168.2.4212.25.241.104
                                          Jan 15, 2025 17:39:55.392950058 CET52332445192.168.2.4212.25.241.104
                                          Jan 15, 2025 17:39:55.393260002 CET52333445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:39:55.398163080 CET44552333212.25.241.1192.168.2.4
                                          Jan 15, 2025 17:39:55.398246050 CET52333445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:39:55.398578882 CET52333445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:39:55.398580074 CET52334445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:39:55.399476051 CET44552332212.25.241.104192.168.2.4
                                          Jan 15, 2025 17:39:55.402232885 CET44552332212.25.241.104192.168.2.4
                                          Jan 15, 2025 17:39:55.402286053 CET52332445192.168.2.4212.25.241.104
                                          Jan 15, 2025 17:39:55.403456926 CET44552334212.25.241.1192.168.2.4
                                          Jan 15, 2025 17:39:55.403465033 CET44552333212.25.241.1192.168.2.4
                                          Jan 15, 2025 17:39:55.403527975 CET52333445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:39:55.403558016 CET52334445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:39:55.403558016 CET52334445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:39:55.408427954 CET44552334212.25.241.1192.168.2.4
                                          Jan 15, 2025 17:39:55.588943005 CET52335445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:55.594000101 CET44552335188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:55.594067097 CET52335445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:55.594125986 CET52335445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:39:55.598958015 CET44552335188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:39:56.418379068 CET4455226936.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:56.419493914 CET52269445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:56.419493914 CET52269445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:56.419493914 CET52269445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:56.425015926 CET4455226936.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:56.425030947 CET4455226936.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:56.783785105 CET52336445192.168.2.492.29.141.21
                                          Jan 15, 2025 17:39:56.788789034 CET4455233692.29.141.21192.168.2.4
                                          Jan 15, 2025 17:39:56.788991928 CET52336445192.168.2.492.29.141.21
                                          Jan 15, 2025 17:39:56.788991928 CET52336445192.168.2.492.29.141.21
                                          Jan 15, 2025 17:39:56.789256096 CET52337445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:39:56.794040918 CET4455233792.29.141.1192.168.2.4
                                          Jan 15, 2025 17:39:56.794060946 CET4455233692.29.141.21192.168.2.4
                                          Jan 15, 2025 17:39:56.794151068 CET52337445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:39:56.794236898 CET52336445192.168.2.492.29.141.21
                                          Jan 15, 2025 17:39:56.794265985 CET52337445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:39:56.795151949 CET52338445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:39:56.799344063 CET4455233792.29.141.1192.168.2.4
                                          Jan 15, 2025 17:39:56.799396992 CET52337445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:39:56.799915075 CET4455233892.29.141.1192.168.2.4
                                          Jan 15, 2025 17:39:56.800024986 CET52338445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:39:56.800024986 CET52338445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:39:56.804778099 CET4455233892.29.141.1192.168.2.4
                                          Jan 15, 2025 17:39:57.370309114 CET52339445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:57.375269890 CET4455233952.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:57.375376940 CET52339445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:57.375411034 CET52339445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:39:57.381175041 CET4455233952.105.25.1192.168.2.4
                                          Jan 15, 2025 17:39:58.026802063 CET52340445192.168.2.4209.12.10.65
                                          Jan 15, 2025 17:39:58.031774044 CET44552340209.12.10.65192.168.2.4
                                          Jan 15, 2025 17:39:58.031891108 CET52340445192.168.2.4209.12.10.65
                                          Jan 15, 2025 17:39:58.031989098 CET52340445192.168.2.4209.12.10.65
                                          Jan 15, 2025 17:39:58.032257080 CET52341445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:39:58.037004948 CET44552340209.12.10.65192.168.2.4
                                          Jan 15, 2025 17:39:58.037072897 CET52340445192.168.2.4209.12.10.65
                                          Jan 15, 2025 17:39:58.037153006 CET44552341209.12.10.1192.168.2.4
                                          Jan 15, 2025 17:39:58.037234068 CET52341445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:39:58.037234068 CET52341445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:39:58.037489891 CET52342445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:39:58.042274952 CET44552342209.12.10.1192.168.2.4
                                          Jan 15, 2025 17:39:58.042335033 CET52342445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:39:58.042354107 CET44552341209.12.10.1192.168.2.4
                                          Jan 15, 2025 17:39:58.042396069 CET52342445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:39:58.042422056 CET52341445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:39:58.047156096 CET44552342209.12.10.1192.168.2.4
                                          Jan 15, 2025 17:39:58.713706017 CET4455229429.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:58.713783026 CET52294445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:58.713870049 CET52294445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:58.713898897 CET52294445192.168.2.429.177.137.1
                                          Jan 15, 2025 17:39:58.718647003 CET4455229429.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:58.718661070 CET4455229429.177.137.1192.168.2.4
                                          Jan 15, 2025 17:39:58.746541977 CET4455229632.240.226.1192.168.2.4
                                          Jan 15, 2025 17:39:58.746710062 CET52296445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:58.746711016 CET52296445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:58.746711016 CET52296445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:39:58.751564980 CET4455229632.240.226.1192.168.2.4
                                          Jan 15, 2025 17:39:58.751578093 CET4455229632.240.226.1192.168.2.4
                                          Jan 15, 2025 17:39:58.776654959 CET52343445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:39:58.781471968 CET4455234329.177.137.2192.168.2.4
                                          Jan 15, 2025 17:39:58.781538010 CET52343445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:39:58.781562090 CET52343445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:39:58.781900883 CET52344445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:39:58.786541939 CET4455234329.177.137.2192.168.2.4
                                          Jan 15, 2025 17:39:58.786602974 CET52343445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:39:58.786690950 CET4455234429.177.137.2192.168.2.4
                                          Jan 15, 2025 17:39:58.786777973 CET52344445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:39:58.786868095 CET52344445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:39:58.791599035 CET4455234429.177.137.2192.168.2.4
                                          Jan 15, 2025 17:39:59.183029890 CET52345445192.168.2.441.209.109.228
                                          Jan 15, 2025 17:39:59.187971115 CET4455234541.209.109.228192.168.2.4
                                          Jan 15, 2025 17:39:59.188204050 CET52345445192.168.2.441.209.109.228
                                          Jan 15, 2025 17:39:59.188204050 CET52345445192.168.2.441.209.109.228
                                          Jan 15, 2025 17:39:59.188302040 CET52346445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:39:59.193661928 CET4455234641.209.109.1192.168.2.4
                                          Jan 15, 2025 17:39:59.193701982 CET4455234541.209.109.228192.168.2.4
                                          Jan 15, 2025 17:39:59.193736076 CET52346445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:39:59.193850994 CET52345445192.168.2.441.209.109.228
                                          Jan 15, 2025 17:39:59.193886995 CET52346445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:39:59.194297075 CET52347445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:39:59.199552059 CET4455234641.209.109.1192.168.2.4
                                          Jan 15, 2025 17:39:59.199631929 CET52346445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:39:59.200058937 CET4455234741.209.109.1192.168.2.4
                                          Jan 15, 2025 17:39:59.200145960 CET52347445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:39:59.200145960 CET52347445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:39:59.205698967 CET4455234741.209.109.1192.168.2.4
                                          Jan 15, 2025 17:39:59.433757067 CET52348445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:59.438842058 CET4455234836.60.110.1192.168.2.4
                                          Jan 15, 2025 17:39:59.439080000 CET52348445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:59.439080000 CET52348445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:39:59.444020033 CET4455234836.60.110.1192.168.2.4
                                          Jan 15, 2025 17:40:00.261133909 CET52349445192.168.2.461.126.105.30
                                          Jan 15, 2025 17:40:00.266108990 CET4455234961.126.105.30192.168.2.4
                                          Jan 15, 2025 17:40:00.266211987 CET52349445192.168.2.461.126.105.30
                                          Jan 15, 2025 17:40:00.266357899 CET52349445192.168.2.461.126.105.30
                                          Jan 15, 2025 17:40:00.266619921 CET52350445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:00.271440983 CET4455235061.126.105.1192.168.2.4
                                          Jan 15, 2025 17:40:00.271456003 CET4455234961.126.105.30192.168.2.4
                                          Jan 15, 2025 17:40:00.271538973 CET52350445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:00.271559954 CET52349445192.168.2.461.126.105.30
                                          Jan 15, 2025 17:40:00.271594048 CET52350445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:00.271970987 CET52351445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:00.276726007 CET4455235161.126.105.1192.168.2.4
                                          Jan 15, 2025 17:40:00.276796103 CET52351445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:00.276823997 CET52351445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:00.277081966 CET4455235061.126.105.1192.168.2.4
                                          Jan 15, 2025 17:40:00.277147055 CET52350445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:00.281570911 CET4455235161.126.105.1192.168.2.4
                                          Jan 15, 2025 17:40:00.490948915 CET4455229954.76.228.1192.168.2.4
                                          Jan 15, 2025 17:40:00.491039991 CET52299445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:40:00.491039991 CET52299445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:40:00.491139889 CET52299445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:40:00.495978117 CET4455229954.76.228.1192.168.2.4
                                          Jan 15, 2025 17:40:00.495990992 CET4455229954.76.228.1192.168.2.4
                                          Jan 15, 2025 17:40:00.637280941 CET44552300115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:40:00.637424946 CET52300445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:40:00.637518883 CET52300445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:40:00.637617111 CET52300445192.168.2.4115.22.22.1
                                          Jan 15, 2025 17:40:00.642517090 CET44552300115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:40:00.642653942 CET44552300115.22.22.1192.168.2.4
                                          Jan 15, 2025 17:40:00.699539900 CET52352445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:00.704421043 CET44552352115.22.22.2192.168.2.4
                                          Jan 15, 2025 17:40:00.704514027 CET52352445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:00.704554081 CET52352445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:00.704874992 CET52353445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:00.709856987 CET44552352115.22.22.2192.168.2.4
                                          Jan 15, 2025 17:40:00.709871054 CET44552353115.22.22.2192.168.2.4
                                          Jan 15, 2025 17:40:00.709914923 CET52352445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:00.709994078 CET52353445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:00.710017920 CET52353445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:00.714818954 CET44552353115.22.22.2192.168.2.4
                                          Jan 15, 2025 17:40:01.277672052 CET52354445192.168.2.4214.105.233.222
                                          Jan 15, 2025 17:40:01.282715082 CET44552354214.105.233.222192.168.2.4
                                          Jan 15, 2025 17:40:01.282902956 CET52354445192.168.2.4214.105.233.222
                                          Jan 15, 2025 17:40:01.282902956 CET52354445192.168.2.4214.105.233.222
                                          Jan 15, 2025 17:40:01.283051968 CET52355445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:01.287974119 CET44552354214.105.233.222192.168.2.4
                                          Jan 15, 2025 17:40:01.287988901 CET44552355214.105.233.1192.168.2.4
                                          Jan 15, 2025 17:40:01.288095951 CET52354445192.168.2.4214.105.233.222
                                          Jan 15, 2025 17:40:01.288156986 CET52355445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:01.288254023 CET52355445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:01.288764954 CET52356445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:01.293225050 CET44552355214.105.233.1192.168.2.4
                                          Jan 15, 2025 17:40:01.293313026 CET52355445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:01.293665886 CET44552356214.105.233.1192.168.2.4
                                          Jan 15, 2025 17:40:01.293755054 CET52356445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:01.293801069 CET52356445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:01.298615932 CET44552356214.105.233.1192.168.2.4
                                          Jan 15, 2025 17:40:01.760864019 CET52357445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:40:01.766510963 CET4455235732.240.226.1192.168.2.4
                                          Jan 15, 2025 17:40:01.766747952 CET52357445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:40:01.766747952 CET52357445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:40:01.772552013 CET4455235732.240.226.1192.168.2.4
                                          Jan 15, 2025 17:40:02.242995977 CET52358445192.168.2.4130.190.236.157
                                          Jan 15, 2025 17:40:02.247977972 CET44552358130.190.236.157192.168.2.4
                                          Jan 15, 2025 17:40:02.248060942 CET52358445192.168.2.4130.190.236.157
                                          Jan 15, 2025 17:40:02.248291969 CET52358445192.168.2.4130.190.236.157
                                          Jan 15, 2025 17:40:02.248497963 CET52359445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:02.253117085 CET44552358130.190.236.157192.168.2.4
                                          Jan 15, 2025 17:40:02.253186941 CET52358445192.168.2.4130.190.236.157
                                          Jan 15, 2025 17:40:02.253428936 CET44552359130.190.236.1192.168.2.4
                                          Jan 15, 2025 17:40:02.253520966 CET52359445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:02.257900953 CET52359445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:02.258213997 CET52360445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:02.262876987 CET44552359130.190.236.1192.168.2.4
                                          Jan 15, 2025 17:40:02.262955904 CET52359445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:02.263910055 CET44552360130.190.236.1192.168.2.4
                                          Jan 15, 2025 17:40:02.263978004 CET52360445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:02.266242981 CET52360445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:02.271908998 CET44552360130.190.236.1192.168.2.4
                                          Jan 15, 2025 17:40:02.524646997 CET4455230324.81.53.1192.168.2.4
                                          Jan 15, 2025 17:40:02.524749041 CET52303445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:40:02.525105000 CET52303445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:40:02.525154114 CET52303445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:40:02.530858040 CET4455230324.81.53.1192.168.2.4
                                          Jan 15, 2025 17:40:02.530868053 CET4455230324.81.53.1192.168.2.4
                                          Jan 15, 2025 17:40:02.620817900 CET4455230476.56.126.1192.168.2.4
                                          Jan 15, 2025 17:40:02.620889902 CET52304445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:40:02.620990038 CET52304445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:40:02.621068954 CET52304445192.168.2.476.56.126.1
                                          Jan 15, 2025 17:40:02.626766920 CET4455230476.56.126.1192.168.2.4
                                          Jan 15, 2025 17:40:02.626872063 CET4455230476.56.126.1192.168.2.4
                                          Jan 15, 2025 17:40:02.683326960 CET52361445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:02.689436913 CET4455236176.56.126.2192.168.2.4
                                          Jan 15, 2025 17:40:02.689503908 CET52361445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:02.689562082 CET52361445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:02.690022945 CET52362445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:02.695677042 CET4455236176.56.126.2192.168.2.4
                                          Jan 15, 2025 17:40:02.695729971 CET52361445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:02.696038008 CET4455236276.56.126.2192.168.2.4
                                          Jan 15, 2025 17:40:02.696095943 CET52362445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:02.696232080 CET52362445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:02.702613115 CET4455236276.56.126.2192.168.2.4
                                          Jan 15, 2025 17:40:03.120595932 CET52364445192.168.2.416.105.17.80
                                          Jan 15, 2025 17:40:03.125901937 CET4455236416.105.17.80192.168.2.4
                                          Jan 15, 2025 17:40:03.125977039 CET52364445192.168.2.416.105.17.80
                                          Jan 15, 2025 17:40:03.126075983 CET52364445192.168.2.416.105.17.80
                                          Jan 15, 2025 17:40:03.126380920 CET52365445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:03.131582022 CET4455236516.105.17.1192.168.2.4
                                          Jan 15, 2025 17:40:03.131759882 CET52365445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:03.131761074 CET52365445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:03.131941080 CET52366445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:03.133801937 CET4455236416.105.17.80192.168.2.4
                                          Jan 15, 2025 17:40:03.133862019 CET52364445192.168.2.416.105.17.80
                                          Jan 15, 2025 17:40:03.136899948 CET4455236616.105.17.1192.168.2.4
                                          Jan 15, 2025 17:40:03.136992931 CET52366445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:03.137047052 CET52366445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:03.138549089 CET4455236516.105.17.1192.168.2.4
                                          Jan 15, 2025 17:40:03.138627052 CET52365445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:03.141865969 CET4455236616.105.17.1192.168.2.4
                                          Jan 15, 2025 17:40:03.495332003 CET52367445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:40:03.500363111 CET4455236754.76.228.1192.168.2.4
                                          Jan 15, 2025 17:40:03.500586987 CET52367445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:40:03.500586987 CET52367445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:40:03.505572081 CET4455236754.76.228.1192.168.2.4
                                          Jan 15, 2025 17:40:03.948772907 CET52369445192.168.2.483.110.238.57
                                          Jan 15, 2025 17:40:03.954231024 CET4455236983.110.238.57192.168.2.4
                                          Jan 15, 2025 17:40:03.954315901 CET52369445192.168.2.483.110.238.57
                                          Jan 15, 2025 17:40:03.954406977 CET52369445192.168.2.483.110.238.57
                                          Jan 15, 2025 17:40:03.954583883 CET52370445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:03.959537029 CET4455236983.110.238.57192.168.2.4
                                          Jan 15, 2025 17:40:03.959547997 CET4455237083.110.238.1192.168.2.4
                                          Jan 15, 2025 17:40:03.959585905 CET52369445192.168.2.483.110.238.57
                                          Jan 15, 2025 17:40:03.959705114 CET52370445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:03.959705114 CET52370445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:03.960002899 CET52371445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:03.964843988 CET4455237183.110.238.1192.168.2.4
                                          Jan 15, 2025 17:40:03.964926004 CET4455237083.110.238.1192.168.2.4
                                          Jan 15, 2025 17:40:03.964931011 CET52371445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:03.964962959 CET52371445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:03.964996099 CET52370445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:03.969716072 CET4455237183.110.238.1192.168.2.4
                                          Jan 15, 2025 17:40:04.527996063 CET4455230797.219.176.1192.168.2.4
                                          Jan 15, 2025 17:40:04.528157949 CET52307445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:40:04.528157949 CET52307445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:40:04.528157949 CET52307445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:40:04.532917023 CET4455230797.219.176.1192.168.2.4
                                          Jan 15, 2025 17:40:04.532960892 CET4455230797.219.176.1192.168.2.4
                                          Jan 15, 2025 17:40:04.633253098 CET44552308165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:40:04.633317947 CET52308445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:40:04.633454084 CET52308445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:40:04.633511066 CET52308445192.168.2.4165.36.191.1
                                          Jan 15, 2025 17:40:04.638252974 CET44552308165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:40:04.638262033 CET44552308165.36.191.1192.168.2.4
                                          Jan 15, 2025 17:40:04.698396921 CET52372445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:04.703264952 CET44552372165.36.191.2192.168.2.4
                                          Jan 15, 2025 17:40:04.703346968 CET52372445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:04.703438044 CET52372445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:04.703758001 CET52373445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:04.708518982 CET44552373165.36.191.2192.168.2.4
                                          Jan 15, 2025 17:40:04.708637953 CET52373445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:04.708671093 CET52373445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:04.709583044 CET44552372165.36.191.2192.168.2.4
                                          Jan 15, 2025 17:40:04.709638119 CET52372445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:04.713387966 CET44552373165.36.191.2192.168.2.4
                                          Jan 15, 2025 17:40:04.714272022 CET52374445192.168.2.4206.193.176.9
                                          Jan 15, 2025 17:40:04.719780922 CET44552374206.193.176.9192.168.2.4
                                          Jan 15, 2025 17:40:04.719866037 CET52374445192.168.2.4206.193.176.9
                                          Jan 15, 2025 17:40:04.719893932 CET52374445192.168.2.4206.193.176.9
                                          Jan 15, 2025 17:40:04.720010042 CET52375445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:04.725807905 CET44552375206.193.176.1192.168.2.4
                                          Jan 15, 2025 17:40:04.725867033 CET52375445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:04.725889921 CET52375445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:04.725936890 CET44552374206.193.176.9192.168.2.4
                                          Jan 15, 2025 17:40:04.726180077 CET52374445192.168.2.4206.193.176.9
                                          Jan 15, 2025 17:40:04.726480961 CET52376445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:04.730796099 CET44552375206.193.176.1192.168.2.4
                                          Jan 15, 2025 17:40:04.730849981 CET52375445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:04.731252909 CET44552376206.193.176.1192.168.2.4
                                          Jan 15, 2025 17:40:04.731328011 CET52376445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:04.731328011 CET52376445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:04.736114979 CET44552376206.193.176.1192.168.2.4
                                          Jan 15, 2025 17:40:05.526488066 CET52383445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:40:05.531383038 CET4455238324.81.53.1192.168.2.4
                                          Jan 15, 2025 17:40:05.531502008 CET52383445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:40:05.531553030 CET52383445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:40:05.536276102 CET4455238324.81.53.1192.168.2.4
                                          Jan 15, 2025 17:40:06.542120934 CET4455231139.117.145.1192.168.2.4
                                          Jan 15, 2025 17:40:06.542187929 CET52311445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:40:06.542260885 CET52311445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:40:06.542294025 CET52311445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:40:06.548183918 CET4455231139.117.145.1192.168.2.4
                                          Jan 15, 2025 17:40:06.548192978 CET4455231139.117.145.1192.168.2.4
                                          Jan 15, 2025 17:40:06.760737896 CET4455231240.55.118.1192.168.2.4
                                          Jan 15, 2025 17:40:06.760935068 CET52312445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:40:06.760935068 CET52312445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:40:06.760991096 CET52312445192.168.2.440.55.118.1
                                          Jan 15, 2025 17:40:06.765777111 CET4455231240.55.118.1192.168.2.4
                                          Jan 15, 2025 17:40:06.765786886 CET4455231240.55.118.1192.168.2.4
                                          Jan 15, 2025 17:40:06.823342085 CET52395445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:06.828758955 CET4455239540.55.118.2192.168.2.4
                                          Jan 15, 2025 17:40:06.828824997 CET52395445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:06.828862906 CET52395445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:06.829134941 CET52396445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:06.834567070 CET4455239540.55.118.2192.168.2.4
                                          Jan 15, 2025 17:40:06.834614038 CET52395445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:06.834923029 CET4455239640.55.118.2192.168.2.4
                                          Jan 15, 2025 17:40:06.834980965 CET52396445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:06.835021973 CET52396445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:06.840605021 CET4455239640.55.118.2192.168.2.4
                                          Jan 15, 2025 17:40:07.542020082 CET52403445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:40:07.546897888 CET4455240397.219.176.1192.168.2.4
                                          Jan 15, 2025 17:40:07.546979904 CET52403445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:40:07.547015905 CET52403445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:40:07.551795959 CET4455240397.219.176.1192.168.2.4
                                          Jan 15, 2025 17:40:08.555299997 CET4455231525.8.63.1192.168.2.4
                                          Jan 15, 2025 17:40:08.555356979 CET52315445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:40:08.555393934 CET52315445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:40:08.555427074 CET52315445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:40:08.560254097 CET4455231525.8.63.1192.168.2.4
                                          Jan 15, 2025 17:40:08.560266972 CET4455231525.8.63.1192.168.2.4
                                          Jan 15, 2025 17:40:08.698519945 CET44552316148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:40:08.698561907 CET52316445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:40:08.698759079 CET52316445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:40:08.698858023 CET52316445192.168.2.4148.190.179.1
                                          Jan 15, 2025 17:40:08.703491926 CET44552316148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:40:08.703556061 CET44552316148.190.179.1192.168.2.4
                                          Jan 15, 2025 17:40:08.761673927 CET52415445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:08.766556978 CET44552415148.190.179.2192.168.2.4
                                          Jan 15, 2025 17:40:08.766618013 CET52415445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:08.772996902 CET52415445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:08.773761988 CET52416445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:08.777816057 CET44552415148.190.179.2192.168.2.4
                                          Jan 15, 2025 17:40:08.777861118 CET52415445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:08.778681040 CET44552416148.190.179.2192.168.2.4
                                          Jan 15, 2025 17:40:08.778743029 CET52416445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:08.778772116 CET52416445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:08.783580065 CET44552416148.190.179.2192.168.2.4
                                          Jan 15, 2025 17:40:09.557775974 CET52430445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:40:09.562853098 CET4455243039.117.145.1192.168.2.4
                                          Jan 15, 2025 17:40:09.565308094 CET52430445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:40:09.565340042 CET52430445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:40:09.570242882 CET4455243039.117.145.1192.168.2.4
                                          Jan 15, 2025 17:40:10.444370031 CET4455231989.237.246.1192.168.2.4
                                          Jan 15, 2025 17:40:10.444453955 CET52319445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:40:10.444499969 CET52319445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:40:10.444528103 CET52319445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:40:10.449421883 CET4455231989.237.246.1192.168.2.4
                                          Jan 15, 2025 17:40:10.449454069 CET4455231989.237.246.1192.168.2.4
                                          Jan 15, 2025 17:40:10.697268009 CET4455232016.122.44.1192.168.2.4
                                          Jan 15, 2025 17:40:10.697323084 CET52320445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:40:10.697344065 CET52320445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:40:10.697376013 CET52320445192.168.2.416.122.44.1
                                          Jan 15, 2025 17:40:10.702238083 CET4455232016.122.44.1192.168.2.4
                                          Jan 15, 2025 17:40:10.702253103 CET4455232016.122.44.1192.168.2.4
                                          Jan 15, 2025 17:40:10.761071920 CET52452445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:10.765938044 CET4455245216.122.44.2192.168.2.4
                                          Jan 15, 2025 17:40:10.766016006 CET52452445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:10.766096115 CET52452445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:10.766432047 CET52453445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:10.771207094 CET4455245216.122.44.2192.168.2.4
                                          Jan 15, 2025 17:40:10.771223068 CET4455245316.122.44.2192.168.2.4
                                          Jan 15, 2025 17:40:10.771264076 CET52452445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:10.771291018 CET52453445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:10.771323919 CET52453445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:10.776067019 CET4455245316.122.44.2192.168.2.4
                                          Jan 15, 2025 17:40:11.557873011 CET52465445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:40:11.562704086 CET4455246525.8.63.1192.168.2.4
                                          Jan 15, 2025 17:40:11.564191103 CET52465445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:40:11.564191103 CET52465445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:40:11.568937063 CET4455246525.8.63.1192.168.2.4
                                          Jan 15, 2025 17:40:12.215342045 CET4455232393.83.4.1192.168.2.4
                                          Jan 15, 2025 17:40:12.215434074 CET52323445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:40:12.215516090 CET52323445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:40:12.215516090 CET52323445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:40:12.220406055 CET4455232393.83.4.1192.168.2.4
                                          Jan 15, 2025 17:40:12.220416069 CET4455232393.83.4.1192.168.2.4
                                          Jan 15, 2025 17:40:12.745182037 CET44552324175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:40:12.745265961 CET52324445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:40:12.745335102 CET52324445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:40:12.745361090 CET52324445192.168.2.4175.138.214.1
                                          Jan 15, 2025 17:40:12.750174999 CET44552324175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:40:12.750188112 CET44552324175.138.214.1192.168.2.4
                                          Jan 15, 2025 17:40:12.808041096 CET52495445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:12.812942982 CET44552495175.138.214.2192.168.2.4
                                          Jan 15, 2025 17:40:12.812995911 CET52495445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:12.813088894 CET52495445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:12.813360929 CET52496445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:12.818016052 CET44552495175.138.214.2192.168.2.4
                                          Jan 15, 2025 17:40:12.818089962 CET44552496175.138.214.2192.168.2.4
                                          Jan 15, 2025 17:40:12.818130970 CET52495445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:12.818151951 CET52496445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:12.818181038 CET52496445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:12.822926044 CET44552496175.138.214.2192.168.2.4
                                          Jan 15, 2025 17:40:13.448421001 CET52514445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:40:13.807601929 CET4972480192.168.2.4199.232.214.172
                                          Jan 15, 2025 17:40:14.120388985 CET4972480192.168.2.4199.232.214.172
                                          Jan 15, 2025 17:40:14.181375980 CET44552327161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:40:14.181432009 CET52327445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:40:14.181466103 CET52327445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:40:14.181468964 CET44552327161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:40:14.181504011 CET52327445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:40:14.181530952 CET52327445192.168.2.4161.183.110.1
                                          Jan 15, 2025 17:40:14.183069944 CET4455251489.237.246.1192.168.2.4
                                          Jan 15, 2025 17:40:14.183082104 CET8049724199.232.214.172192.168.2.4
                                          Jan 15, 2025 17:40:14.183094025 CET8049724199.232.214.172192.168.2.4
                                          Jan 15, 2025 17:40:14.183140993 CET52514445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:40:14.183172941 CET4972480192.168.2.4199.232.214.172
                                          Jan 15, 2025 17:40:14.183221102 CET52514445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:40:14.189697981 CET44552327161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:40:14.189707994 CET44552327161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:40:14.189718008 CET44552327161.183.110.1192.168.2.4
                                          Jan 15, 2025 17:40:14.189744949 CET4455251489.237.246.1192.168.2.4
                                          Jan 15, 2025 17:40:14.756177902 CET4455232847.235.125.1192.168.2.4
                                          Jan 15, 2025 17:40:14.756232023 CET52328445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:40:14.756266117 CET52328445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:40:14.756313086 CET52328445192.168.2.447.235.125.1
                                          Jan 15, 2025 17:40:14.761104107 CET4455232847.235.125.1192.168.2.4
                                          Jan 15, 2025 17:40:14.761116028 CET4455232847.235.125.1192.168.2.4
                                          Jan 15, 2025 17:40:14.810215950 CET52560445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:14.815077066 CET4455256047.235.125.2192.168.2.4
                                          Jan 15, 2025 17:40:14.815165997 CET52560445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:14.815232038 CET52560445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:14.815474987 CET52561445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:14.820190907 CET4455256147.235.125.2192.168.2.4
                                          Jan 15, 2025 17:40:14.820250034 CET52561445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:14.820282936 CET52561445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:14.820307970 CET4455256047.235.125.2192.168.2.4
                                          Jan 15, 2025 17:40:14.820410967 CET52560445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:14.825006008 CET4455256147.235.125.2192.168.2.4
                                          Jan 15, 2025 17:40:15.229517937 CET52584445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:40:15.418719053 CET44552331155.214.228.1192.168.2.4
                                          Jan 15, 2025 17:40:15.418906927 CET52331445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:40:15.418955088 CET52331445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:40:15.418955088 CET52331445192.168.2.4155.214.228.1
                                          Jan 15, 2025 17:40:15.419789076 CET4455258493.83.4.1192.168.2.4
                                          Jan 15, 2025 17:40:15.419945002 CET52584445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:40:15.420027971 CET52584445192.168.2.493.83.4.1
                                          Jan 15, 2025 17:40:15.424663067 CET44552331155.214.228.1192.168.2.4
                                          Jan 15, 2025 17:40:15.424671888 CET44552331155.214.228.1192.168.2.4
                                          Jan 15, 2025 17:40:15.425621033 CET4455258493.83.4.1192.168.2.4
                                          Jan 15, 2025 17:40:16.788027048 CET44552334212.25.241.1192.168.2.4
                                          Jan 15, 2025 17:40:16.788104057 CET52334445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:40:16.959922075 CET44552335188.158.166.1192.168.2.4
                                          Jan 15, 2025 17:40:16.960089922 CET52335445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:40:17.176862955 CET52496445192.168.2.4175.138.214.2
                                          Jan 15, 2025 17:40:17.176976919 CET52453445192.168.2.416.122.44.2
                                          Jan 15, 2025 17:40:17.177071095 CET52416445192.168.2.4148.190.179.2
                                          Jan 15, 2025 17:40:17.177083015 CET52367445192.168.2.454.76.228.1
                                          Jan 15, 2025 17:40:17.177083015 CET52373445192.168.2.4165.36.191.2
                                          Jan 15, 2025 17:40:17.177151918 CET52561445192.168.2.447.235.125.2
                                          Jan 15, 2025 17:40:17.177151918 CET52348445192.168.2.436.60.110.1
                                          Jan 15, 2025 17:40:17.177175999 CET52335445192.168.2.4188.158.166.1
                                          Jan 15, 2025 17:40:17.177175999 CET52334445192.168.2.4212.25.241.1
                                          Jan 15, 2025 17:40:17.177248001 CET52339445192.168.2.452.105.25.1
                                          Jan 15, 2025 17:40:17.177258015 CET52338445192.168.2.492.29.141.1
                                          Jan 15, 2025 17:40:17.177290916 CET52344445192.168.2.429.177.137.2
                                          Jan 15, 2025 17:40:17.177311897 CET52342445192.168.2.4209.12.10.1
                                          Jan 15, 2025 17:40:17.177311897 CET52347445192.168.2.441.209.109.1
                                          Jan 15, 2025 17:40:17.177315950 CET52351445192.168.2.461.126.105.1
                                          Jan 15, 2025 17:40:17.177357912 CET52353445192.168.2.4115.22.22.2
                                          Jan 15, 2025 17:40:17.177362919 CET52356445192.168.2.4214.105.233.1
                                          Jan 15, 2025 17:40:17.177385092 CET52360445192.168.2.4130.190.236.1
                                          Jan 15, 2025 17:40:17.177405119 CET52357445192.168.2.432.240.226.1
                                          Jan 15, 2025 17:40:17.177464008 CET52366445192.168.2.416.105.17.1
                                          Jan 15, 2025 17:40:17.177469015 CET52362445192.168.2.476.56.126.2
                                          Jan 15, 2025 17:40:17.177505016 CET52371445192.168.2.483.110.238.1
                                          Jan 15, 2025 17:40:17.177514076 CET52376445192.168.2.4206.193.176.1
                                          Jan 15, 2025 17:40:17.177534103 CET52383445192.168.2.424.81.53.1
                                          Jan 15, 2025 17:40:17.177534103 CET52396445192.168.2.440.55.118.2
                                          Jan 15, 2025 17:40:17.177587986 CET52430445192.168.2.439.117.145.1
                                          Jan 15, 2025 17:40:17.177644968 CET52403445192.168.2.497.219.176.1
                                          Jan 15, 2025 17:40:17.177644968 CET52465445192.168.2.425.8.63.1
                                          Jan 15, 2025 17:40:17.177654028 CET52514445192.168.2.489.237.246.1
                                          Jan 15, 2025 17:40:17.177834988 CET52584445192.168.2.493.83.4.1
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 15, 2025 17:39:09.509358883 CET6326053192.168.2.41.1.1.1
                                          Jan 15, 2025 17:39:09.820863008 CET53632601.1.1.1192.168.2.4
                                          Jan 15, 2025 17:39:10.449203968 CET5812453192.168.2.41.1.1.1
                                          Jan 15, 2025 17:39:10.997303963 CET53581241.1.1.1192.168.2.4
                                          Jan 15, 2025 17:39:25.392129898 CET138138192.168.2.4192.168.2.255
                                          Jan 15, 2025 17:39:26.127060890 CET53571891.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jan 15, 2025 17:39:09.509358883 CET192.168.2.41.1.1.10xc9e0Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                          Jan 15, 2025 17:39:10.449203968 CET192.168.2.41.1.1.10x2140Standard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jan 15, 2025 17:39:09.820863008 CET1.1.1.1192.168.2.40xc9e0No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                          Jan 15, 2025 17:39:10.997303963 CET1.1.1.1192.168.2.40x2140No error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                          Jan 15, 2025 17:39:10.997303963 CET1.1.1.1192.168.2.40x2140No error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                          • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449730103.224.212.215806952C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 17:39:09.831712008 CET100OUTGET / HTTP/1.1
                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Cache-Control: no-cache
                                          Jan 15, 2025 17:39:10.442640066 CET365INHTTP/1.1 302 Found
                                          date: Wed, 15 Jan 2025 16:39:10 GMT
                                          server: Apache
                                          set-cookie: __tad=1736959150.4303657; expires=Sat, 13-Jan-2035 16:39:10 GMT; Max-Age=315360000
                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-10de-bd4f-b194c111ddf5
                                          content-length: 2
                                          content-type: text/html; charset=UTF-8
                                          connection: close
                                          Data Raw: 0a 0a
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.449731199.59.243.228806952C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 17:39:11.010627031 CET169OUTGET /?subid1=20250116-0339-10de-bd4f-b194c111ddf5 HTTP/1.1
                                          Cache-Control: no-cache
                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Connection: Keep-Alive
                                          Jan 15, 2025 17:39:11.495743990 CET1236INHTTP/1.1 200 OK
                                          date: Wed, 15 Jan 2025 16:39:10 GMT
                                          content-type: text/html; charset=utf-8
                                          content-length: 1262
                                          x-request-id: c8e9fa67-ff38-48a4-b918-ac053a75dcf3
                                          cache-control: no-store, max-age=0
                                          accept-ch: sec-ch-prefers-color-scheme
                                          critical-ch: sec-ch-prefers-color-scheme
                                          vary: sec-ch-prefers-color-scheme
                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_aL6FuBRg7eFkQFqTBKbiel+9AFiavYOalUs/fE77S0t1DYiFLt9xmlwlPPanLpV/ptGt1xo5vqLgmYraLoP40g==
                                          set-cookie: parking_session=c8e9fa67-ff38-48a4-b918-ac053a75dcf3; expires=Wed, 15 Jan 2025 16:54:11 GMT; path=/
                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 61 4c 36 46 75 42 52 67 37 65 46 6b 51 46 71 54 42 4b 62 69 65 6c 2b 39 41 46 69 61 76 59 4f 61 6c 55 73 2f 66 45 37 37 53 30 74 31 44 59 69 46 4c 74 39 78 6d 6c 77 6c 50 50 61 6e 4c 70 56 2f 70 74 47 74 31 78 6f 35 76 71 4c 67 6d 59 72 61 4c 6f 50 34 30 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_aL6FuBRg7eFkQFqTBKbiel+9AFiavYOalUs/fE77S0t1DYiFLt9xmlwlPPanLpV/ptGt1xo5vqLgmYraLoP40g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                          Jan 15, 2025 17:39:11.495795965 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                          Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYzhlOWZhNjctZmYzOC00OGE0LWI5MTgtYWMwNTNhNzVkY2YzIiwicGFnZV90aW1lIjoxNzM2OTU5MTUxLCJwYWdlX3VybCI6I


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.2.449732103.224.212.215807128C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 17:39:11.680569887 CET100OUTGET / HTTP/1.1
                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Cache-Control: no-cache
                                          Jan 15, 2025 17:39:12.306335926 CET365INHTTP/1.1 302 Found
                                          date: Wed, 15 Jan 2025 16:39:12 GMT
                                          server: Apache
                                          set-cookie: __tad=1736959152.3008085; expires=Sat, 13-Jan-2035 16:39:12 GMT; Max-Age=315360000
                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12e8-a7c6-ba11581ef804
                                          content-length: 2
                                          content-type: text/html; charset=UTF-8
                                          connection: close
                                          Data Raw: 0a 0a
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          3192.168.2.449733199.59.243.228807128C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 17:39:12.319102049 CET169OUTGET /?subid1=20250116-0339-12e8-a7c6-ba11581ef804 HTTP/1.1
                                          Cache-Control: no-cache
                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Connection: Keep-Alive
                                          Jan 15, 2025 17:39:12.802174091 CET1236INHTTP/1.1 200 OK
                                          date: Wed, 15 Jan 2025 16:39:12 GMT
                                          content-type: text/html; charset=utf-8
                                          content-length: 1262
                                          x-request-id: 6f78de3c-df38-43f4-bbfb-bbf332c163c4
                                          cache-control: no-store, max-age=0
                                          accept-ch: sec-ch-prefers-color-scheme
                                          critical-ch: sec-ch-prefers-color-scheme
                                          vary: sec-ch-prefers-color-scheme
                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_V0lphZQRRvWUWORx4k8GOeiW/0pfCUFPJla/Si8JTWAkTt+LUOuyKb/Ug6sUfbawgfqYF/tHJ2eEqp8y5iVamA==
                                          set-cookie: parking_session=6f78de3c-df38-43f4-bbfb-bbf332c163c4; expires=Wed, 15 Jan 2025 16:54:12 GMT; path=/
                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 56 30 6c 70 68 5a 51 52 52 76 57 55 57 4f 52 78 34 6b 38 47 4f 65 69 57 2f 30 70 66 43 55 46 50 4a 6c 61 2f 53 69 38 4a 54 57 41 6b 54 74 2b 4c 55 4f 75 79 4b 62 2f 55 67 36 73 55 66 62 61 77 67 66 71 59 46 2f 74 48 4a 32 65 45 71 70 38 79 35 69 56 61 6d 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_V0lphZQRRvWUWORx4k8GOeiW/0pfCUFPJla/Si8JTWAkTt+LUOuyKb/Ug6sUfbawgfqYF/tHJ2eEqp8y5iVamA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                          Jan 15, 2025 17:39:12.802228928 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                          Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNmY3OGRlM2MtZGYzOC00M2Y0LWJiZmItYmJmMzMyYzE2M2M0IiwicGFnZV90aW1lIjoxNzM2OTU5MTUyLCJwYWdlX3VybCI6I


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          4192.168.2.449734103.224.212.215805244C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 17:39:12.324337959 CET134OUTGET / HTTP/1.1
                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Cache-Control: no-cache
                                          Cookie: __tad=1736959150.4303657
                                          Jan 15, 2025 17:39:12.943775892 CET269INHTTP/1.1 302 Found
                                          date: Wed, 15 Jan 2025 16:39:12 GMT
                                          server: Apache
                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0339-12ec-b81e-7c389c283ae8
                                          content-length: 2
                                          content-type: text/html; charset=UTF-8
                                          connection: close
                                          Data Raw: 0a 0a
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          5192.168.2.449741199.59.243.228805244C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 17:39:12.952877998 CET231OUTGET /?subid1=20250116-0339-12ec-b81e-7c389c283ae8 HTTP/1.1
                                          Cache-Control: no-cache
                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Connection: Keep-Alive
                                          Cookie: parking_session=c8e9fa67-ff38-48a4-b918-ac053a75dcf3
                                          Jan 15, 2025 17:39:13.428018093 CET1236INHTTP/1.1 200 OK
                                          date: Wed, 15 Jan 2025 16:39:12 GMT
                                          content-type: text/html; charset=utf-8
                                          content-length: 1262
                                          x-request-id: 5565d711-11d4-47f6-a32c-4dba586750a1
                                          cache-control: no-store, max-age=0
                                          accept-ch: sec-ch-prefers-color-scheme
                                          critical-ch: sec-ch-prefers-color-scheme
                                          vary: sec-ch-prefers-color-scheme
                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_xdP9nEOE76lfl7rTwLnhfZgb/deQxas/PqviC9PYIZsCYnhmqjOdM8SwBpAMa4/+BAF/NyUE9ocGNKMXE8yvBA==
                                          set-cookie: parking_session=c8e9fa67-ff38-48a4-b918-ac053a75dcf3; expires=Wed, 15 Jan 2025 16:54:13 GMT
                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 78 64 50 39 6e 45 4f 45 37 36 6c 66 6c 37 72 54 77 4c 6e 68 66 5a 67 62 2f 64 65 51 78 61 73 2f 50 71 76 69 43 39 50 59 49 5a 73 43 59 6e 68 6d 71 6a 4f 64 4d 38 53 77 42 70 41 4d 61 34 2f 2b 42 41 46 2f 4e 79 55 45 39 6f 63 47 4e 4b 4d 58 45 38 79 76 42 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_xdP9nEOE76lfl7rTwLnhfZgb/deQxas/PqviC9PYIZsCYnhmqjOdM8SwBpAMa4/+BAF/NyUE9ocGNKMXE8yvBA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                          Jan 15, 2025 17:39:13.428070068 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                          Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYzhlOWZhNjctZmYzOC00OGE0LWI5MTgtYWMwNTNhNzVkY2YzIiwicGFnZV90aW1lIjoxNzM2OTU5MTUzLCJwYWdlX3VybCI6Imh0dHA6L


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:11:39:08
                                          Start date:15/01/2025
                                          Path:C:\Windows\System32\loaddll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:loaddll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll"
                                          Imagebase:0xbc0000
                                          File size:126'464 bytes
                                          MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:1
                                          Start time:11:39:08
                                          Start date:15/01/2025
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:11:39:08
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1
                                          Imagebase:0x240000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:11:39:08
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:rundll32.exe C:\Users\user\Desktop\q4e7rZQEkL.dll,PlayGame
                                          Imagebase:0x7f0000
                                          File size:61'440 bytes
                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:11:39:08
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",#1
                                          Imagebase:0x7f0000
                                          File size:61'440 bytes
                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:11:39:08
                                          Start date:15/01/2025
                                          Path:C:\Windows\mssecsvr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\WINDOWS\mssecsvr.exe
                                          Imagebase:0x400000
                                          File size:2'281'472 bytes
                                          MD5 hash:EDF4881B12065F814C90F9DC71BE9B62
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1725170395.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000005.00000000.1725354645.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000005.00000000.1725354645.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          Reputation:low
                                          Has exited:true

                                          Target ID:6
                                          Start time:11:39:10
                                          Start date:15/01/2025
                                          Path:C:\Windows\mssecsvr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                          Imagebase:0x400000
                                          File size:2'281'472 bytes
                                          MD5 hash:EDF4881B12065F814C90F9DC71BE9B62
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1747794261.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2397891299.0000000002272000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2397891299.0000000002272000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1747920345.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1747920345.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2397614773.0000000001D53000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2397614773.0000000001D53000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                          Reputation:low
                                          Has exited:true

                                          Target ID:7
                                          Start time:11:39:11
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:rundll32.exe "C:\Users\user\Desktop\q4e7rZQEkL.dll",PlayGame
                                          Imagebase:0x7f0000
                                          File size:61'440 bytes
                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:11:39:11
                                          Start date:15/01/2025
                                          Path:C:\Windows\mssecsvr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\WINDOWS\mssecsvr.exe
                                          Imagebase:0x400000
                                          File size:2'281'472 bytes
                                          MD5 hash:EDF4881B12065F814C90F9DC71BE9B62
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1766760488.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.1766902808.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.1766902808.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1753881608.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1754163167.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1754163167.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          Reputation:low
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:71.8%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:64.9%
                                            Total number of Nodes:37
                                            Total number of Limit Nodes:9

                                            Callgraph

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                            • sprintf.MSVCRT ref: 00407E01
                                            • sprintf.MSVCRT ref: 00407E18
                                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                            • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                            • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                            • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                            • CreateProcessA.KERNELBASE ref: 00407EE8
                                            • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                            • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1761569667.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000005.00000002.1761514755.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761611904.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761755765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                            • API String ID: 4281112323-1507730452
                                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1761569667.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000005.00000002.1761514755.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761611904.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761755765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                            • String ID:
                                            • API String ID: 801014965-0
                                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                            Control-flow Graph

                                            APIs
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                            Strings
                                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1761569667.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000005.00000002.1761514755.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761611904.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761755765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            • API String ID: 774561529-2614457033
                                            • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                            • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                            • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                            • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                            Control-flow Graph

                                            APIs
                                            • sprintf.MSVCRT ref: 00407C56
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1761569667.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000005.00000002.1761514755.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761611904.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761755765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                            • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                            • API String ID: 3340711343-2450984573
                                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • __p___argc.MSVCRT ref: 004080A5
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1761569667.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000005.00000002.1761514755.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761611904.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761648202.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761755765.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000005.00000002.1761855070.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                            • String ID: mssecsvc2.1
                                            • API String ID: 4274534310-2839763450
                                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                            Execution Graph

                                            Execution Coverage:34.9%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:35
                                            Total number of Limit Nodes:2

                                            Callgraph

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • __p___argc.MSVCRT ref: 004080A5
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F380EF0,00000000,?,004081B2), ref: 004080DC
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2396743267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2396726903.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396759162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396822642.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396838715.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                            • String ID: mssecsvc2.1
                                            • API String ID: 4274534310-2839763450
                                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                            Control-flow Graph

                                            APIs
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                            Strings
                                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2396743267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2396726903.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396759162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396822642.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396838715.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            • API String ID: 774561529-2614457033
                                            • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                            • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                            • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                            • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                            Control-flow Graph

                                            APIs
                                            • sprintf.MSVCRT ref: 00407C56
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F380EF0,00000000), ref: 00407C9B
                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2396743267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2396726903.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396759162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396822642.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396838715.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                            • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                            • API String ID: 3340711343-2450984573
                                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F380EF0,?,00000000), ref: 00407CEF
                                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                            • sprintf.MSVCRT ref: 00407E01
                                            • sprintf.MSVCRT ref: 00407E18
                                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2396743267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2396726903.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396759162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396822642.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396838715.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                            • API String ID: 4072214828-1507730452
                                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2396743267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2396726903.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396759162.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396772748.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396808946.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396822642.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396838715.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.0000000000854000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2396921648.00000000008BE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                            • String ID:
                                            • API String ID: 801014965-0
                                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59