Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1U9rHEz9Rg.dll

Overview

General Information

Sample name:1U9rHEz9Rg.dll
renamed because original name is a hash value
Original sample name:ad31ca449f285250368196306a8ad77a.dll
Analysis ID:1592130
MD5:ad31ca449f285250368196306a8ad77a
SHA1:abefa604d54027fac646df910a9ecbc462b01ec2
SHA256:962caf150b14b5804de96484e8b911f93fcb26ab11f7e713d3f0c02a211c2577
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7356 cmdline: loaddll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7416 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7464 cmdline: rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7496 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1DA4AA17D6682E2224513E559E86D658)
    • rundll32.exe (PID: 7424 cmdline: rundll32.exe C:\Users\user\Desktop\1U9rHEz9Rg.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7612 cmdline: rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 7632 cmdline: C:\WINDOWS\mssecsvc.exe MD5: 1DA4AA17D6682E2224513E559E86D658)
  • mssecsvc.exe (PID: 7604 cmdline: C:\WINDOWS\mssecsvc.exe -m security MD5: 1DA4AA17D6682E2224513E559E86D658)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
1U9rHEz9Rg.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    1U9rHEz9Rg.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    1U9rHEz9Rg.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      C:\Windows\mssecsvc.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        C:\Windows\mssecsvc.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
        • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
        • 0x3136c:$x3: tasksche.exe
        • 0x4157c:$x3: tasksche.exe
        • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
        • 0x415d0:$x5: WNcry@2ol7
        • 0xe048:$x7: mssecsvc.exe
        • 0x17350:$x7: mssecsvc.exe
        • 0x31344:$x8: C:\%s\qeriuwjhrf
        • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
        • 0xe034:$s1: C:\%s\%s
        • 0x17338:$s1: C:\%s\%s
        • 0x31358:$s1: C:\%s\%s
        • 0x414d0:$s3: cmd.exe /c "%s"
        • 0x73a24:$s4: msg/m_portuguese.wnry
        • 0x2e68c:$s5: \\192.168.56.20\IPC$
        • 0x1ba81:$s6: \\172.16.99.5\IPC$
        • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
        • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
        • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000A.00000000.1395551943.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000A.00000002.1414303371.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000008.00000000.1392320862.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                  Click to see the 20 entries
                  SourceRuleDescriptionAuthorStrings
                  8.2.mssecsvc.exe.23da8c8.8.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  8.2.mssecsvc.exe.1ea8084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                  • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                  • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                  8.0.mssecsvc.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                  • 0xe8d8:$x3: tasksche.exe
                  • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                  • 0xe92c:$x5: WNcry@2ol7
                  • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                  • 0xe82c:$s3: cmd.exe /c "%s"
                  8.0.mssecsvc.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                  • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                  • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                  6.2.mssecsvc.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                  • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                  • 0xe8d8:$x3: tasksche.exe
                  • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                  • 0xe92c:$x5: WNcry@2ol7
                  • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                  • 0xe82c:$s3: cmd.exe /c "%s"
                  Click to see the 88 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-15T19:59:06.541815+010028033043Unknown Traffic192.168.2.949742103.224.212.21580TCP
                  2025-01-15T19:59:08.330079+010028033043Unknown Traffic192.168.2.949753103.224.212.21580TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-15T19:59:05.511684+010028300181A Network Trojan was detected192.168.2.9533131.1.1.153UDP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1U9rHEz9Rg.dllAvira: detected
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/U(Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c918bAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354a7Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/VAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062afAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c91Avira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/FAvira URL Cloud: Label: malware
                  Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwAvira URL Cloud: Label: malware
                  Source: C:\Windows\mssecsvc.exeAvira: detection malicious, Label: TR/Ransom.Gen
                  Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 100%
                  Source: C:\Windows\mssecsvc.exeReversingLabs: Detection: 92%
                  Source: C:\Windows\tasksche.exeReversingLabs: Detection: 100%
                  Source: 1U9rHEz9Rg.dllVirustotal: Detection: 87%Perma Link
                  Source: 1U9rHEz9Rg.dllReversingLabs: Detection: 92%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                  Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                  Source: C:\Windows\mssecsvc.exeJoe Sandbox ML: detected
                  Source: 1U9rHEz9Rg.dllJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                  Source: 1U9rHEz9Rg.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.9:53313 -> 1.1.1.1:53
                  Source: unknownNetwork traffic detected: IP country count 10
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0559-0613-ae2f-1ca90d9c918b HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0559-089c-93ee-f812d32354a7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736967546.4825785
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0559-0897-b8cc-09a3c53062af HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=ad8299c7-89ff-4ec2-bbe2-55e27823d865
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49742 -> 103.224.212.215:80
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49753 -> 103.224.212.215:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                  Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.50
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.50
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.50
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.50
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.230.216.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.162
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.162
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.162
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.162
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.75.188.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 79.172.32.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.195.139.41
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.195.139.41
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.195.139.41
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.195.139.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.195.139.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0559-0613-ae2f-1ca90d9c918b HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0559-089c-93ee-f812d32354a7 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736967546.4825785
                  Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0559-0897-b8cc-09a3c53062af HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=ad8299c7-89ff-4ec2-bbe2-55e27823d865
                  Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvc.exe, 00000006.00000002.1408503031.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2046685688.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw
                  Source: mssecsvc.exe, 00000006.00000002.1408503031.0000000000DC9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1408503031.0000000000DE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c91
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C0C000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000003.1413516723.0000000000C39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062
                  Source: mssecsvc.exe, 00000008.00000002.2046685688.0000000000DEB000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.1407663417.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2046685688.0000000000E07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/F
                  Source: mssecsvc.exe, 00000008.00000002.2046685688.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/U(
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/V
                  Source: mssecsvc.exe.4.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  Source: mssecsvc.exe, 00000006.00000002.1408503031.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com.?
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                  Source: mssecsvc.exe, 00000008.00000002.2046685688.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Y
                  Source: mssecsvc.exe, 00000008.00000002.2046038121.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comr
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: 1U9rHEz9Rg.dll, type: SAMPLE
                  Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.1eda128.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.240c96c.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.23e9948.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb7104.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.23da8c8.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.1ea8084.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.23e9948.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb30a4.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.23e58e8.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.mssecsvc.exe.1eb7104.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1395551943.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.1414303371.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.1392320862.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1365666506.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.1392456132.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1395912911.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2047532566.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2047163125.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1365853075.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.1414468681.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7496, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7604, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7632, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Windows\mssecsvc.exe, type: DROPPED

                  System Summary

                  barindex
                  Source: 1U9rHEz9Rg.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 1U9rHEz9Rg.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.23da8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.1ea8084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.240c96c.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.240c96c.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.1eda128.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.1eda128.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.1eda128.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.1eda128.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.240c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.240c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.23e9948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.23e9948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.2.mssecsvc.exe.23e9948.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.1eb7104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.1eb7104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.2.mssecsvc.exe.1eb7104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.23da8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.23da8c8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.1ea8084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.1ea8084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 8.2.mssecsvc.exe.1ea8084.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.23e9948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.23e9948.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.1eb30a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.1eb30a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.23e58e8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.23e58e8.9.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 8.2.mssecsvc.exe.1eb7104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 8.2.mssecsvc.exe.1eb7104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000000.1392456132.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 0000000A.00000000.1395912911.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000002.2047532566.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000008.00000002.2047163125.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000000.1365853075.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 0000000A.00000002.1414468681.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                  Source: mssecsvc.exe.4.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
                  Source: tasksche.exe.6.drStatic PE information: No import functions for PE file found
                  Source: 1U9rHEz9Rg.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  Source: 1U9rHEz9Rg.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 1U9rHEz9Rg.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.23da8c8.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.1ea8084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.240c96c.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.240c96c.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 10.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 10.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.1eda128.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.1eda128.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 10.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.1eda128.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.1eda128.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 10.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.240c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.240c96c.6.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 10.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.23e9948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.23e9948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.2.mssecsvc.exe.23e9948.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.1eb7104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.1eb7104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.2.mssecsvc.exe.1eb7104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.23da8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.23da8c8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 10.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.1ea8084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.1ea8084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 8.2.mssecsvc.exe.1ea8084.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.23e9948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.23e9948.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.1eb30a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.1eb30a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.23e58e8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.23e58e8.9.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 8.2.mssecsvc.exe.1eb7104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 8.2.mssecsvc.exe.1eb7104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000000.1392456132.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 0000000A.00000000.1395912911.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000002.2047532566.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000008.00000002.2047163125.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000000.1365853075.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 0000000A.00000002.1414468681.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: C:\Windows\mssecsvc.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: tasksche.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: tasksche.exe.6.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                  Source: tasksche.exe.6.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                  Source: tasksche.exe.6.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                  Source: 1U9rHEz9Rg.dll, tasksche.exe.6.dr, mssecsvc.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                  Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/3@2/100
                  Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                  Source: C:\Windows\mssecsvc.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7364:120:WilError_03
                  Source: 1U9rHEz9Rg.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\1U9rHEz9Rg.dll,PlayGame
                  Source: 1U9rHEz9Rg.dllVirustotal: Detection: 87%
                  Source: 1U9rHEz9Rg.dllReversingLabs: Detection: 92%
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll"
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\1U9rHEz9Rg.dll,PlayGame
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                  Source: unknownProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe -m security
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",PlayGame
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\1U9rHEz9Rg.dll,PlayGameJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",PlayGameJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1Jump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: 1U9rHEz9Rg.dllStatic file information: File size 5267459 > 1048576
                  Source: 1U9rHEz9Rg.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                  Source: tasksche.exe.6.drStatic PE information: section name: .text entropy: 7.616414583309269

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                  Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvc.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvc.exeJump to dropped file
                  Source: C:\Windows\mssecsvc.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: C:\Windows\mssecsvc.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                  Source: C:\Windows\mssecsvc.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                  Source: C:\Windows\mssecsvc.exe TID: 7732Thread sleep count: 93 > 30Jump to behavior
                  Source: C:\Windows\mssecsvc.exe TID: 7732Thread sleep time: -186000s >= -30000sJump to behavior
                  Source: C:\Windows\mssecsvc.exe TID: 7736Thread sleep count: 126 > 30Jump to behavior
                  Source: C:\Windows\mssecsvc.exe TID: 7736Thread sleep count: 44 > 30Jump to behavior
                  Source: C:\Windows\mssecsvc.exe TID: 7732Thread sleep time: -86400000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                  Source: C:\Windows\mssecsvc.exeThread delayed: delay time: 86400000Jump to behavior
                  Source: mssecsvc.exe, 00000008.00000002.2046685688.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(=
                  Source: mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWs
                  Source: mssecsvc.exe, 00000006.00000002.1408503031.0000000000DC9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1408503031.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.1407663417.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2046685688.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.1414815496.0000000000BD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: mssecsvc.exe, 00000008.00000003.1407663417.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2046685688.0000000000E07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW~
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1Jump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Service Execution
                  4
                  Windows Service
                  4
                  Windows Service
                  12
                  Masquerading
                  OS Credential Dumping1
                  Network Share Discovery
                  Remote ServicesData from Local System2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  11
                  Process Injection
                  21
                  Virtualization/Sandbox Evasion
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  11
                  Process Injection
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Obfuscated Files or Information
                  NTDS1
                  System Information Discovery
                  Distributed Component Object ModelInput Capture3
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Rundll32
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Software Packing
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592130 Sample: 1U9rHEz9Rg.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 40 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->40 42 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->42 44 77026.bodis.com 2->44 54 Suricata IDS alerts for network traffic 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 7 other signatures 2->60 9 loaddll32.exe 1 2->9         started        11 mssecsvc.exe 12 2->11         started        signatures3 process4 dnsIp5 15 cmd.exe 1 9->15         started        17 rundll32.exe 9->17         started        20 rundll32.exe 1 9->20         started        23 conhost.exe 9->23         started        46 192.168.2.102 unknown unknown 11->46 48 192.168.2.103 unknown unknown 11->48 50 98 other IPs or domains 11->50 62 Connects to many different private IPs via SMB (likely to spread or exploit) 11->62 64 Connects to many different private IPs (likely to spread or exploit) 11->64 signatures6 process7 file8 25 rundll32.exe 15->25         started        52 Drops executables to the windows directory (C:\Windows) and starts them 17->52 27 mssecsvc.exe 13 17->27         started        34 C:\Windows\mssecsvc.exe, PE32 20->34 dropped signatures9 process10 file11 30 mssecsvc.exe 13 25->30         started        36 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->36 dropped process12 file13 38 C:\Windows\tasksche.exe, PE32 30->38 dropped 66 Antivirus detection for dropped file 30->66 68 Multi AV Scanner detection for dropped file 30->68 70 Machine Learning detection for dropped file 30->70 signatures14

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  1U9rHEz9Rg.dll88%VirustotalBrowse
                  1U9rHEz9Rg.dll92%ReversingLabsWin32.Ransomware.WannaCry
                  1U9rHEz9Rg.dll100%AviraTR/AD.WannaCry.pskpy
                  1U9rHEz9Rg.dll100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Windows\mssecsvc.exe100%AviraTR/Ransom.Gen
                  C:\Windows\tasksche.exe100%Joe Sandbox ML
                  C:\Windows\mssecsvc.exe100%Joe Sandbox ML
                  C:\WINDOWS\qeriuwjhrf (copy)100%ReversingLabsWin32.Ransomware.WannaCry
                  C:\Windows\mssecsvc.exe93%ReversingLabsWin32.Ransomware.WannaCry
                  C:\Windows\tasksche.exe100%ReversingLabsWin32.Ransomware.WannaCry
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/U(100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c918b100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354100%Avira URL Cloudmalware
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comr0%Avira URL Cloudsafe
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354a7100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/V100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062100%Avira URL Cloudmalware
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com.?0%Avira URL Cloudsafe
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062af100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c91100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/F100%Avira URL Cloudmalware
                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  77026.bodis.com
                  199.59.243.228
                  truefalse
                    high
                    s-part-0017.t-0009.t-msedge.net
                    13.107.246.45
                    truefalse
                      high
                      www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                      103.224.212.215
                      truefalse
                        high
                        ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c918bfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354a7false
                          • Avira URL Cloud: malware
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062affalse
                            • Avira URL Cloud: malware
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/U(mssecsvc.exe, 00000008.00000002.2046685688.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354mssecsvc.exe, 00000008.00000002.2046685688.0000000000DEB000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000003.1407663417.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2046685688.0000000000E07000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvc.exe, 00000006.00000002.1408503031.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000008.00000002.2046685688.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.commssecsvc.exe.4.drfalse
                                high
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Vmssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062mssecsvc.exe, 0000000A.00000002.1414815496.0000000000C0C000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 0000000A.00000003.1413516723.0000000000C39000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comrmssecsvc.exe, 0000000A.00000002.1414815496.0000000000BD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com.?mssecsvc.exe, 00000006.00000002.1408503031.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c91mssecsvc.exe, 00000006.00000002.1408503031.0000000000DC9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1408503031.0000000000DE3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvc.exe, 00000008.00000002.2046038121.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Ymssecsvc.exe, 0000000A.00000002.1414815496.0000000000BD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Fmssecsvc.exe, 0000000A.00000002.1414815496.0000000000C2D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2mssecsvc.exe, 00000008.00000002.2046685688.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwmssecsvc.exe, 0000000A.00000002.1414815496.0000000000C0C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      88.10.108.201
                                      unknownSpain
                                      3352TELEFONICA_DE_ESPANAESfalse
                                      201.41.62.1
                                      unknownBrazil
                                      8167BrasilTelecomSA-FilialDistritoFederalBRfalse
                                      16.102.172.174
                                      unknownUnited States
                                      unknownunknownfalse
                                      42.230.216.50
                                      unknownChina
                                      4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                      164.135.40.116
                                      unknownSweden
                                      51551CAPITA-ASGBfalse
                                      107.43.37.133
                                      unknownUnited States
                                      16567NETRIX-16567USfalse
                                      107.43.37.1
                                      unknownUnited States
                                      16567NETRIX-16567USfalse
                                      42.230.216.2
                                      unknownChina
                                      4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                      42.230.216.1
                                      unknownChina
                                      4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                      40.72.68.1
                                      unknownChina
                                      58593BLUECLOUDShanghaiBlueCloudTechnologyCoLtdCNfalse
                                      143.249.87.243
                                      unknownUnited States
                                      1781KAIST-DAEJEON-AS-KRKoreaAdvancedInstituteofScienceandfalse
                                      67.221.200.130
                                      unknownUnited States
                                      62943AS62943-BLUEBIRD-NETWORKUSfalse
                                      185.184.157.183
                                      unknownUnited Kingdom
                                      62217VOOSERVERSGBfalse
                                      188.195.139.41
                                      unknownGermany
                                      31334KABELDEUTSCHLAND-ASDEfalse
                                      36.17.33.2
                                      unknownChina
                                      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                      36.17.33.1
                                      unknownChina
                                      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                      188.75.188.2
                                      unknownCzech Republic
                                      196735AS-JONCZjakubjonczCZfalse
                                      188.75.188.1
                                      unknownCzech Republic
                                      196735AS-JONCZjakubjonczCZfalse
                                      36.17.33.46
                                      unknownChina
                                      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                      82.250.219.1
                                      unknownFrance
                                      12322PROXADFRfalse
                                      208.156.168.1
                                      unknownUnited States
                                      3561CENTURYLINK-LEGACY-SAVVISUSfalse
                                      IP
                                      192.168.2.148
                                      192.168.2.149
                                      192.168.2.146
                                      192.168.2.147
                                      192.168.2.140
                                      192.168.2.141
                                      192.168.2.144
                                      192.168.2.145
                                      192.168.2.142
                                      192.168.2.143
                                      192.168.2.159
                                      192.168.2.157
                                      192.168.2.158
                                      10.200.100.1
                                      10.200.100.2
                                      192.168.2.151
                                      192.168.2.152
                                      192.168.2.150
                                      192.168.2.155
                                      192.168.2.156
                                      192.168.2.153
                                      192.168.2.154
                                      192.168.2.126
                                      192.168.2.247
                                      192.168.2.127
                                      192.168.2.248
                                      192.168.2.124
                                      192.168.2.245
                                      192.168.2.125
                                      192.168.2.246
                                      192.168.2.128
                                      192.168.2.249
                                      192.168.2.129
                                      192.168.2.240
                                      192.168.2.122
                                      192.168.2.243
                                      192.168.2.123
                                      192.168.2.244
                                      192.168.2.120
                                      192.168.2.241
                                      192.168.2.121
                                      192.168.2.242
                                      192.168.2.97
                                      192.168.2.137
                                      192.168.2.96
                                      192.168.2.138
                                      192.168.2.99
                                      192.168.2.135
                                      192.168.2.98
                                      192.168.2.136
                                      192.168.2.139
                                      192.168.2.250
                                      192.168.2.130
                                      192.168.2.251
                                      192.168.2.91
                                      192.168.2.90
                                      192.168.2.93
                                      192.168.2.133
                                      192.168.2.254
                                      192.168.2.92
                                      192.168.2.134
                                      192.168.2.95
                                      192.168.2.131
                                      192.168.2.252
                                      192.168.2.94
                                      192.168.2.132
                                      192.168.2.253
                                      192.168.2.104
                                      192.168.2.225
                                      192.168.2.105
                                      192.168.2.226
                                      192.168.2.102
                                      192.168.2.223
                                      192.168.2.103
                                      192.168.2.224
                                      192.168.2.108
                                      192.168.2.229
                                      192.168.2.109
                                      192.168.2.106
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1592130
                                      Start date and time:2025-01-15 19:58:10 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 41s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:14
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:1U9rHEz9Rg.dll
                                      renamed because original name is a hash value
                                      Original Sample Name:ad31ca449f285250368196306a8ad77a.dll
                                      Detection:MAL
                                      Classification:mal100.rans.expl.evad.winDLL@18/3@2/100
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .dll
                                      • Stop behavior analysis, all processes terminated
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      13:59:06API Interceptor1x Sleep call for process: loaddll32.exe modified
                                      13:59:42API Interceptor112x Sleep call for process: mssecsvc.exe modified
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      s-part-0017.t-0009.t-msedge.nethttps://52f1897b.5648702dd4d5255cab645104.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                      • 13.107.246.45
                                      Order.xlsGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      Order.xlsGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      Order.xlsGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      random.exeGet hashmaliciousLiteHTTP BotBrowse
                                      • 13.107.246.45
                                      ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      https://tinyurl.com/AmconconstructionGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      Zohobooks Voip CaIIer left (4) voice message from +1 (___) ___-__92 [MSG ID-zNeaDpAKAIgeQjKGl].emlGet hashmaliciousHTMLPhisherBrowse
                                      • 13.107.246.45
                                      https://u13762205.ct.sendgrid.net/ls/click?upn=u001.2N-2FFSd8Mh5tdTcK2pEXUToH0F5-2Fq3FDo8pnKFzcXMK24EOVQRPQXOzov3WP6TeQDbpOFMAzOhzk6g52qaRBXMg-3D-3DIjNL_PKcFXsnzduNOkTk1M1BuFSXBwpDtJ5JnfBBGS8mWfSDpSIzzZrzaRAqzsWn9I2SACyGbOCQAHofmU9ue-2Bfpl8m5UVDAXfATbU3zHgCM2w6TpOzhFbmwlUQoZzHTxRoJD6sBCzgzJz3SY7rmsp-2BquYHmL2DTOkQggmMFIfKhNPVaBf8NTmimDBPZdcr9YqjF8L6hryY10MBbjsSOUH778gw-3D-3DGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      https://shunnarah.com/attorney/candace-t-brownGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      77026.bodis.comQQE81XYXon.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      f5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      q4e7rZQEkL.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      Gn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comQQE81XYXon.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      f5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      q4e7rZQEkL.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      Gn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      TELEFONICA_DE_ESPANAEShNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                      • 2.139.197.109
                                      bot.sh4.elfGet hashmaliciousUnknownBrowse
                                      • 88.9.29.176
                                      bot.arm7.elfGet hashmaliciousMiraiBrowse
                                      • 88.2.210.139
                                      xd.arm.elfGet hashmaliciousMiraiBrowse
                                      • 80.27.58.247
                                      mpsl.elfGet hashmaliciousMiraiBrowse
                                      • 81.39.167.31
                                      GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                      • 79.149.62.181
                                      meth3.elfGet hashmaliciousMiraiBrowse
                                      • 80.37.247.26
                                      meth1.elfGet hashmaliciousMiraiBrowse
                                      • 195.55.237.236
                                      arm4.elfGet hashmaliciousUnknownBrowse
                                      • 79.157.112.164
                                      spc.elfGet hashmaliciousUnknownBrowse
                                      • 81.39.143.76
                                      BrasilTelecomSA-FilialDistritoFederalBRarm5.elfGet hashmaliciousMiraiBrowse
                                      • 201.67.116.232
                                      xd.sh4.elfGet hashmaliciousMiraiBrowse
                                      • 201.35.38.199
                                      xd.ppc.elfGet hashmaliciousMiraiBrowse
                                      • 189.11.80.74
                                      mips.elfGet hashmaliciousMiraiBrowse
                                      • 179.255.153.190
                                      m68k.elfGet hashmaliciousUnknownBrowse
                                      • 191.222.20.48
                                      meth4.elfGet hashmaliciousMiraiBrowse
                                      • 200.215.49.3
                                      x86_64.elfGet hashmaliciousUnknownBrowse
                                      • 187.5.92.93
                                      mips.elfGet hashmaliciousUnknownBrowse
                                      • 187.5.168.43
                                      res.arm5.elfGet hashmaliciousUnknownBrowse
                                      • 177.5.1.129
                                      6.elfGet hashmaliciousUnknownBrowse
                                      • 200.96.249.8
                                      CHINA169-BACKBONECHINAUNICOMChina169BackboneCNzTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                      • 119.163.139.1
                                      bot.x86.elfGet hashmaliciousUnknownBrowse
                                      • 218.12.108.24
                                      bot.spc.elfGet hashmaliciousUnknownBrowse
                                      • 120.13.105.98
                                      bot.m68k.elfGet hashmaliciousUnknownBrowse
                                      • 1.58.95.53
                                      bot.sh4.elfGet hashmaliciousUnknownBrowse
                                      • 182.127.195.47
                                      bot.arm7.elfGet hashmaliciousMiraiBrowse
                                      • 110.53.232.223
                                      bot.arm.elfGet hashmaliciousUnknownBrowse
                                      • 112.234.116.161
                                      bot.ppc.elfGet hashmaliciousUnknownBrowse
                                      • 123.190.80.3
                                      i686.elfGet hashmaliciousMiraiBrowse
                                      • 175.19.79.106
                                      i486.elfGet hashmaliciousMiraiBrowse
                                      • 112.249.78.89
                                      No context
                                      No context
                                      Process:C:\Windows\mssecsvc.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):2061938
                                      Entropy (8bit):7.99213314060892
                                      Encrypted:true
                                      SSDEEP:49152:hqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvm:hqPoBhz1aRxcSUDk36SAEdhvm
                                      MD5:4CF1595972413914EE36C92584DA1C4F
                                      SHA1:2106CA6DDE83CA404EF9B00D998FD8B58628E3FB
                                      SHA-256:156CAE52162F94349AD25C4C2833769B20290AA5E48109479E8DD035B094F8BD
                                      SHA-512:08C5068F30C09E0941C60521ECBE69F4BE537DB3ADAAE47026E903F8466067347FCD522F37E9D56C464D0913F3B008038BBA1D0FC83637BA0E176BD24FCEDB9B
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 100%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):3723264
                                      Entropy (8bit):6.030842406453329
                                      Encrypted:false
                                      SSDEEP:49152:2n+qMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:y+qPoBhz1aRxcSUDk36SAEdhvxWa9
                                      MD5:1DA4AA17D6682E2224513E559E86D658
                                      SHA1:435B8D0AFB90A66BC63EAF9FDB5B1CE27D56DACD
                                      SHA-256:63500B6A365A6E688AFECDF632EA399B6E80529C17D292F1F1839A1C26DFED3D
                                      SHA-512:BF6993555E3F9AD33EF275DB233E80BAF7DDF5F66C288FCA2CF9CBC24AD6716DF50F987A987D1C6ABBD851BCC7CB29263C80FE0E43AE9E9EA4C0F9235224A89F
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                      • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                      • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 93%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=.A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L.....L.....................08...................@...........................f......................................................1.T.5..........................................................................................................text.............................. ..`.rdata..............................@..@.data....H0......p..................@....rsrc...T.5...1...5.. ..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\mssecsvc.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):2061938
                                      Entropy (8bit):7.99213314060892
                                      Encrypted:true
                                      SSDEEP:49152:hqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvm:hqPoBhz1aRxcSUDk36SAEdhvm
                                      MD5:4CF1595972413914EE36C92584DA1C4F
                                      SHA1:2106CA6DDE83CA404EF9B00D998FD8B58628E3FB
                                      SHA-256:156CAE52162F94349AD25C4C2833769B20290AA5E48109479E8DD035B094F8BD
                                      SHA-512:08C5068F30C09E0941C60521ECBE69F4BE537DB3ADAAE47026E903F8466067347FCD522F37E9D56C464D0913F3B008038BBA1D0FC83637BA0E176BD24FCEDB9B
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                      • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 100%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):4.589104819256542
                                      TrID:
                                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                      • Generic Win/DOS Executable (2004/3) 0.20%
                                      • DOS Executable Generic (2002/1) 0.20%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:1U9rHEz9Rg.dll
                                      File size:5'267'459 bytes
                                      MD5:ad31ca449f285250368196306a8ad77a
                                      SHA1:abefa604d54027fac646df910a9ecbc462b01ec2
                                      SHA256:962caf150b14b5804de96484e8b911f93fcb26ab11f7e713d3f0c02a211c2577
                                      SHA512:57700c858fd9f1b3bea65af6a75fc9770a8b7b98ae195b3d53d62a4d315012ea28cc28a4e2e7dc55e137e5611cf049f0cfe4ffc6110e3bfe22a437cb52af7c15
                                      SSDEEP:49152:Sn+qMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:++qPoBhz1aRxcSUDk36SAEdhvxWa9
                                      TLSH:2536339871BC91FCD20619B444A7CA52F2B23C6966FE6E0F9B4049761D03B5AFB90F43
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                      Icon Hash:7ae282899bbab082
                                      Entrypoint:0x100011e9
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x10000000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                      DLL Characteristics:
                                      Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      push ebx
                                      mov ebx, dword ptr [ebp+08h]
                                      push esi
                                      mov esi, dword ptr [ebp+0Ch]
                                      push edi
                                      mov edi, dword ptr [ebp+10h]
                                      test esi, esi
                                      jne 00007F643472C7DBh
                                      cmp dword ptr [10003140h], 00000000h
                                      jmp 00007F643472C7F8h
                                      cmp esi, 01h
                                      je 00007F643472C7D7h
                                      cmp esi, 02h
                                      jne 00007F643472C7F4h
                                      mov eax, dword ptr [10003150h]
                                      test eax, eax
                                      je 00007F643472C7DBh
                                      push edi
                                      push esi
                                      push ebx
                                      call eax
                                      test eax, eax
                                      je 00007F643472C7DEh
                                      push edi
                                      push esi
                                      push ebx
                                      call 00007F643472C6EAh
                                      test eax, eax
                                      jne 00007F643472C7D6h
                                      xor eax, eax
                                      jmp 00007F643472C820h
                                      push edi
                                      push esi
                                      push ebx
                                      call 00007F643472C59Ch
                                      cmp esi, 01h
                                      mov dword ptr [ebp+0Ch], eax
                                      jne 00007F643472C7DEh
                                      test eax, eax
                                      jne 00007F643472C809h
                                      push edi
                                      push eax
                                      push ebx
                                      call 00007F643472C6C6h
                                      test esi, esi
                                      je 00007F643472C7D7h
                                      cmp esi, 03h
                                      jne 00007F643472C7F8h
                                      push edi
                                      push esi
                                      push ebx
                                      call 00007F643472C6B5h
                                      test eax, eax
                                      jne 00007F643472C7D5h
                                      and dword ptr [ebp+0Ch], eax
                                      cmp dword ptr [ebp+0Ch], 00000000h
                                      je 00007F643472C7E3h
                                      mov eax, dword ptr [10003150h]
                                      test eax, eax
                                      je 00007F643472C7DAh
                                      push edi
                                      push esi
                                      push ebx
                                      call eax
                                      mov dword ptr [ebp+0Ch], eax
                                      mov eax, dword ptr [ebp+0Ch]
                                      pop edi
                                      pop esi
                                      pop ebx
                                      pop ebp
                                      retn 000Ch
                                      jmp dword ptr [10002028h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      Programming Language:
                                      • [ C ] VS98 (6.0) build 8168
                                      • [C++] VS98 (6.0) build 8168
                                      • [RES] VS98 (6.0) cvtres build 1720
                                      • [LNK] VS98 (6.0) imp/exp build 8168
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x40000x5000600x5010003ddc8bfc0e0e4fab84bc26b30746cd54unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      W0x40600x500000dataEnglishUnited States0.8785982131958008
                                      DLLImport
                                      KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                      MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                      NameOrdinalAddress
                                      PlayGame10x10001114
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2025-01-15T19:59:05.511684+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.9533131.1.1.153UDP
                                      2025-01-15T19:59:06.541815+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949742103.224.212.21580TCP
                                      2025-01-15T19:59:08.330079+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949753103.224.212.21580TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 15, 2025 19:58:57.214086056 CET49677443192.168.2.920.189.173.11
                                      Jan 15, 2025 19:58:59.370254993 CET49676443192.168.2.923.206.229.209
                                      Jan 15, 2025 19:58:59.370281935 CET49675443192.168.2.923.206.229.209
                                      Jan 15, 2025 19:58:59.604712009 CET49674443192.168.2.923.206.229.209
                                      Jan 15, 2025 19:58:59.620378017 CET49677443192.168.2.920.189.173.11
                                      Jan 15, 2025 19:59:04.432801962 CET49677443192.168.2.920.189.173.11
                                      Jan 15, 2025 19:59:05.635850906 CET49673443192.168.2.9204.79.197.203
                                      Jan 15, 2025 19:59:05.824378014 CET4974280192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:05.829217911 CET8049742103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:05.829319954 CET4974280192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:05.829505920 CET4974280192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:05.834260941 CET8049742103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:06.541752100 CET8049742103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:06.541815042 CET4974280192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:06.541872978 CET8049742103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:06.541915894 CET4974280192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:06.548531055 CET4974280192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:06.553333044 CET8049742103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:06.881330013 CET4974880192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:06.886117935 CET8049748199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:06.886200905 CET4974880192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:06.886321068 CET4974880192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:06.891151905 CET8049748199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:07.348448038 CET8049748199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:07.348469019 CET8049748199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:07.348535061 CET4974880192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:07.353758097 CET4974880192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:07.353785992 CET4974880192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:07.721349955 CET4975380192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:07.726155043 CET8049753103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:07.726239920 CET4975380192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:07.734153032 CET4975380192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:07.738944054 CET8049753103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:08.329915047 CET8049753103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:08.329932928 CET8049753103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:08.330079079 CET4975380192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:08.330079079 CET4975380192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:08.377758980 CET4975380192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:08.379645109 CET4975780192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:08.382572889 CET8049753103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:08.384531975 CET8049757199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:08.384608984 CET4975780192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:08.424168110 CET4975880192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:08.429058075 CET8049758103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:08.429151058 CET4975880192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:08.533899069 CET4975780192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:08.538753033 CET8049757199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:08.594605923 CET4975880192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:08.599412918 CET8049758103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:08.848803997 CET8049757199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:08.848819971 CET8049757199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:08.848865032 CET4975780192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:08.848889112 CET4975780192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:08.856329918 CET4975780192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:08.856358051 CET4975780192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:08.933996916 CET49763445192.168.2.942.230.216.50
                                      Jan 15, 2025 19:59:08.938891888 CET4454976342.230.216.50192.168.2.9
                                      Jan 15, 2025 19:59:08.938971996 CET49763445192.168.2.942.230.216.50
                                      Jan 15, 2025 19:59:08.939021111 CET49763445192.168.2.942.230.216.50
                                      Jan 15, 2025 19:59:08.944303989 CET49764445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:08.945204973 CET4454976342.230.216.50192.168.2.9
                                      Jan 15, 2025 19:59:08.949233055 CET4454976442.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:08.949299097 CET49764445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:08.950356007 CET49764445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:08.951934099 CET49765445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:08.956902981 CET4454976542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:08.956974983 CET49765445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:08.957050085 CET49765445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:08.957591057 CET4454976442.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:08.961797953 CET4454976542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:08.975408077 CET4454976342.230.216.50192.168.2.9
                                      Jan 15, 2025 19:59:08.975528955 CET49763445192.168.2.942.230.216.50
                                      Jan 15, 2025 19:59:08.978099108 CET4454976442.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:08.978146076 CET49764445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:08.979609013 CET49676443192.168.2.923.206.229.209
                                      Jan 15, 2025 19:59:08.979626894 CET49675443192.168.2.923.206.229.209
                                      Jan 15, 2025 19:59:09.044250965 CET8049758103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:09.044306993 CET4975880192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:09.044492006 CET8049758103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:09.044537067 CET4975880192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:09.047010899 CET4975880192.168.2.9103.224.212.215
                                      Jan 15, 2025 19:59:09.048481941 CET4976980192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:09.051976919 CET8049758103.224.212.215192.168.2.9
                                      Jan 15, 2025 19:59:09.053384066 CET8049769199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:09.053453922 CET4976980192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:09.053673029 CET4976980192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:09.058446884 CET8049769199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:09.205251932 CET49674443192.168.2.923.206.229.209
                                      Jan 15, 2025 19:59:09.519624949 CET8049769199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:09.519670963 CET8049769199.59.243.228192.168.2.9
                                      Jan 15, 2025 19:59:09.519714117 CET4976980192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:09.519756079 CET4976980192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:09.527582884 CET4976980192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:09.527612925 CET4976980192.168.2.9199.59.243.228
                                      Jan 15, 2025 19:59:10.906043053 CET49797445192.168.2.9188.75.188.162
                                      Jan 15, 2025 19:59:10.907706022 CET4434970423.206.229.209192.168.2.9
                                      Jan 15, 2025 19:59:10.910203934 CET49704443192.168.2.923.206.229.209
                                      Jan 15, 2025 19:59:10.910834074 CET44549797188.75.188.162192.168.2.9
                                      Jan 15, 2025 19:59:10.911077976 CET49797445192.168.2.9188.75.188.162
                                      Jan 15, 2025 19:59:10.911214113 CET49797445192.168.2.9188.75.188.162
                                      Jan 15, 2025 19:59:10.915719032 CET49798445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:10.916048050 CET44549797188.75.188.162192.168.2.9
                                      Jan 15, 2025 19:59:10.916238070 CET49797445192.168.2.9188.75.188.162
                                      Jan 15, 2025 19:59:10.920530081 CET44549798188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:10.920591116 CET49798445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:10.920670986 CET49798445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:10.922336102 CET49799445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:10.925673008 CET44549798188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:10.925724030 CET49798445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:10.927217960 CET44549799188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:10.927280903 CET49799445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:10.927387953 CET49799445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:10.932149887 CET44549799188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:12.918922901 CET49832445192.168.2.979.172.32.42
                                      Jan 15, 2025 19:59:12.923736095 CET4454983279.172.32.42192.168.2.9
                                      Jan 15, 2025 19:59:12.923839092 CET49832445192.168.2.979.172.32.42
                                      Jan 15, 2025 19:59:12.923938990 CET49832445192.168.2.979.172.32.42
                                      Jan 15, 2025 19:59:12.924324989 CET49833445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:12.928750038 CET4454983279.172.32.42192.168.2.9
                                      Jan 15, 2025 19:59:12.928822041 CET49832445192.168.2.979.172.32.42
                                      Jan 15, 2025 19:59:12.929133892 CET4454983379.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:12.929197073 CET49833445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:12.929243088 CET49833445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:12.930617094 CET49834445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:12.934052944 CET4454983379.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:12.934129000 CET49833445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:12.935394049 CET4454983479.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:12.935461998 CET49834445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:12.935543060 CET49834445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:12.940241098 CET4454983479.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:14.042160034 CET49677443192.168.2.920.189.173.11
                                      Jan 15, 2025 19:59:14.935816050 CET49856445192.168.2.9188.195.139.41
                                      Jan 15, 2025 19:59:14.940633059 CET44549856188.195.139.41192.168.2.9
                                      Jan 15, 2025 19:59:14.940716028 CET49856445192.168.2.9188.195.139.41
                                      Jan 15, 2025 19:59:14.940807104 CET49856445192.168.2.9188.195.139.41
                                      Jan 15, 2025 19:59:14.941122055 CET49857445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:14.945919037 CET44549857188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:14.945987940 CET49857445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:14.946126938 CET49857445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:14.947909117 CET49858445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:14.949139118 CET44549856188.195.139.41192.168.2.9
                                      Jan 15, 2025 19:59:14.954040051 CET44549858188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:14.954055071 CET44549857188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:14.954128981 CET49858445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:14.954241037 CET49858445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:14.959048986 CET44549858188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:14.971940041 CET44549856188.195.139.41192.168.2.9
                                      Jan 15, 2025 19:59:14.972002029 CET49856445192.168.2.9188.195.139.41
                                      Jan 15, 2025 19:59:14.972213030 CET44549857188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:14.972255945 CET49857445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:16.950730085 CET49879445192.168.2.910.200.100.205
                                      Jan 15, 2025 19:59:16.955720901 CET4454987910.200.100.205192.168.2.9
                                      Jan 15, 2025 19:59:16.955799103 CET49879445192.168.2.910.200.100.205
                                      Jan 15, 2025 19:59:16.955898046 CET49879445192.168.2.910.200.100.205
                                      Jan 15, 2025 19:59:16.956180096 CET49880445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:16.961076975 CET4454988010.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:16.961142063 CET49880445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:16.961230040 CET4454987910.200.100.205192.168.2.9
                                      Jan 15, 2025 19:59:16.961250067 CET49880445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:16.963102102 CET49881445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:16.968013048 CET4454988110.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:16.968082905 CET49881445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:16.968122005 CET49881445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:16.970237970 CET4454987910.200.100.205192.168.2.9
                                      Jan 15, 2025 19:59:16.970289946 CET49879445192.168.2.910.200.100.205
                                      Jan 15, 2025 19:59:16.970367908 CET4454988010.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:16.970413923 CET49880445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:16.972935915 CET4454988110.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:18.986850023 CET49904445192.168.2.9164.135.40.116
                                      Jan 15, 2025 19:59:18.991730928 CET44549904164.135.40.116192.168.2.9
                                      Jan 15, 2025 19:59:18.991806030 CET49904445192.168.2.9164.135.40.116
                                      Jan 15, 2025 19:59:18.991993904 CET49904445192.168.2.9164.135.40.116
                                      Jan 15, 2025 19:59:18.992539883 CET49906445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:18.996809006 CET44549904164.135.40.116192.168.2.9
                                      Jan 15, 2025 19:59:18.996856928 CET49904445192.168.2.9164.135.40.116
                                      Jan 15, 2025 19:59:18.997374058 CET44549906164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:18.997502089 CET49906445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:18.997502089 CET49906445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:19.002957106 CET44549906164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:19.003149033 CET49906445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:19.487675905 CET49907445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:19.492593050 CET44549907164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:19.492698908 CET49907445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:19.492835999 CET49907445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:19.497550011 CET44549907164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:20.999335051 CET49926445192.168.2.9160.106.135.209
                                      Jan 15, 2025 19:59:21.004210949 CET44549926160.106.135.209192.168.2.9
                                      Jan 15, 2025 19:59:21.007337093 CET49926445192.168.2.9160.106.135.209
                                      Jan 15, 2025 19:59:21.009696960 CET49926445192.168.2.9160.106.135.209
                                      Jan 15, 2025 19:59:21.009710073 CET49927445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:21.014966965 CET44549927160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:21.014980078 CET44549926160.106.135.209192.168.2.9
                                      Jan 15, 2025 19:59:21.015069008 CET49927445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:21.015166998 CET49927445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:21.015265942 CET49926445192.168.2.9160.106.135.209
                                      Jan 15, 2025 19:59:21.015547991 CET49928445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:21.020504951 CET44549928160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:21.020580053 CET49928445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:21.020598888 CET49928445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:21.021141052 CET44549927160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:21.021255970 CET44549927160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:21.021306038 CET49927445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:21.025392056 CET44549928160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:23.011310101 CET49950445192.168.2.936.17.33.46
                                      Jan 15, 2025 19:59:23.016705036 CET4454995036.17.33.46192.168.2.9
                                      Jan 15, 2025 19:59:23.016802073 CET49950445192.168.2.936.17.33.46
                                      Jan 15, 2025 19:59:23.016832113 CET49950445192.168.2.936.17.33.46
                                      Jan 15, 2025 19:59:23.017019987 CET49951445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:23.021842957 CET4454995136.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:23.021914005 CET4454995036.17.33.46192.168.2.9
                                      Jan 15, 2025 19:59:23.022027016 CET49950445192.168.2.936.17.33.46
                                      Jan 15, 2025 19:59:23.022357941 CET49952445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:23.022358894 CET49951445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:23.027143955 CET4454995236.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:23.027206898 CET49952445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:23.027245045 CET4454995136.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:23.027287960 CET49952445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:23.027303934 CET49951445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:23.032140970 CET4454995236.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:25.027173042 CET49972445192.168.2.952.2.231.109
                                      Jan 15, 2025 19:59:25.032104969 CET4454997252.2.231.109192.168.2.9
                                      Jan 15, 2025 19:59:25.032341003 CET49972445192.168.2.952.2.231.109
                                      Jan 15, 2025 19:59:25.032380104 CET49972445192.168.2.952.2.231.109
                                      Jan 15, 2025 19:59:25.032571077 CET49973445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:25.037444115 CET4454997352.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:25.037476063 CET4454997252.2.231.109192.168.2.9
                                      Jan 15, 2025 19:59:25.037519932 CET49973445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:25.037550926 CET49972445192.168.2.952.2.231.109
                                      Jan 15, 2025 19:59:25.037704945 CET49973445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:25.038038969 CET49974445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:25.042634010 CET4454997352.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:25.042702913 CET49973445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:25.042951107 CET4454997452.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:25.043011904 CET49974445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:25.043042898 CET49974445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:25.047940016 CET4454997452.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:27.042716026 CET49997445192.168.2.988.10.108.201
                                      Jan 15, 2025 19:59:27.047542095 CET4454999788.10.108.201192.168.2.9
                                      Jan 15, 2025 19:59:27.047638893 CET49997445192.168.2.988.10.108.201
                                      Jan 15, 2025 19:59:27.047713041 CET49997445192.168.2.988.10.108.201
                                      Jan 15, 2025 19:59:27.047888994 CET49998445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:27.052598000 CET4454999788.10.108.201192.168.2.9
                                      Jan 15, 2025 19:59:27.052640915 CET4454999888.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:27.052679062 CET49997445192.168.2.988.10.108.201
                                      Jan 15, 2025 19:59:27.052721024 CET49998445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:27.052795887 CET49998445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:27.053194046 CET49999445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:27.057671070 CET4454999888.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:27.057806015 CET49998445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:27.058041096 CET4454999988.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:27.058126926 CET49999445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:27.058154106 CET49999445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:27.062908888 CET4454999988.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:29.058294058 CET50021445192.168.2.9107.43.37.133
                                      Jan 15, 2025 19:59:29.134335995 CET44550021107.43.37.133192.168.2.9
                                      Jan 15, 2025 19:59:29.134504080 CET50021445192.168.2.9107.43.37.133
                                      Jan 15, 2025 19:59:29.134783983 CET50021445192.168.2.9107.43.37.133
                                      Jan 15, 2025 19:59:29.134789944 CET50023445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:29.139543056 CET44550021107.43.37.133192.168.2.9
                                      Jan 15, 2025 19:59:29.139600039 CET50021445192.168.2.9107.43.37.133
                                      Jan 15, 2025 19:59:29.139628887 CET44550023107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:29.139688969 CET50023445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:29.139766932 CET50023445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:29.140048027 CET50024445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:29.144843102 CET44550024107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:29.144928932 CET50024445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:29.144977093 CET50024445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:29.145138025 CET44550023107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:29.145484924 CET44550023107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:29.145529032 CET50023445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:29.149720907 CET44550024107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:30.335788012 CET4454976542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:30.335906982 CET49765445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:30.336066008 CET49765445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:30.336160898 CET49765445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:30.340876102 CET4454976542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:30.340946913 CET4454976542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:31.100779057 CET50046445192.168.2.9208.156.168.122
                                      Jan 15, 2025 19:59:31.105604887 CET44550046208.156.168.122192.168.2.9
                                      Jan 15, 2025 19:59:31.105668068 CET50046445192.168.2.9208.156.168.122
                                      Jan 15, 2025 19:59:31.108515024 CET50046445192.168.2.9208.156.168.122
                                      Jan 15, 2025 19:59:31.108647108 CET50047445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:31.113430023 CET44550046208.156.168.122192.168.2.9
                                      Jan 15, 2025 19:59:31.113441944 CET44550047208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:31.113477945 CET50046445192.168.2.9208.156.168.122
                                      Jan 15, 2025 19:59:31.113509893 CET50047445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:31.114911079 CET50047445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:31.115348101 CET50048445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:31.119730949 CET44550047208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:31.119766951 CET50047445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:31.120083094 CET44550048208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:31.120131969 CET50048445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:31.120162010 CET50048445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:31.124861002 CET44550048208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:32.320067883 CET44549799188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:32.320151091 CET49799445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:32.320214033 CET49799445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:32.320283890 CET49799445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:32.324980974 CET44549799188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:32.325052023 CET44549799188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:33.105350018 CET50069445192.168.2.9106.99.254.161
                                      Jan 15, 2025 19:59:33.110233068 CET44550069106.99.254.161192.168.2.9
                                      Jan 15, 2025 19:59:33.110317945 CET50069445192.168.2.9106.99.254.161
                                      Jan 15, 2025 19:59:33.110388041 CET50069445192.168.2.9106.99.254.161
                                      Jan 15, 2025 19:59:33.110495090 CET50070445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:33.115416050 CET44550070106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:33.115427971 CET44550069106.99.254.161192.168.2.9
                                      Jan 15, 2025 19:59:33.115518093 CET50069445192.168.2.9106.99.254.161
                                      Jan 15, 2025 19:59:33.115524054 CET50070445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:33.120105982 CET50070445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:33.120760918 CET50071445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:33.125600100 CET44550071106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:33.125669956 CET50071445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:33.125727892 CET50071445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:33.126075029 CET44550070106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:33.126127005 CET50070445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:33.130537033 CET44550071106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:33.339883089 CET50075445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:33.345308065 CET4455007542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:33.345382929 CET50075445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:33.345451117 CET50075445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:33.350770950 CET4455007542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:34.323266983 CET4454983479.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:34.323318958 CET49834445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:34.323370934 CET49834445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:34.323664904 CET49834445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:34.330121040 CET4454983479.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:34.330739021 CET4454983479.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:35.121226072 CET50081445192.168.2.9165.49.37.175
                                      Jan 15, 2025 19:59:35.126106977 CET44550081165.49.37.175192.168.2.9
                                      Jan 15, 2025 19:59:35.128058910 CET50081445192.168.2.9165.49.37.175
                                      Jan 15, 2025 19:59:35.128077984 CET50081445192.168.2.9165.49.37.175
                                      Jan 15, 2025 19:59:35.128252029 CET50082445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:35.133155107 CET44550081165.49.37.175192.168.2.9
                                      Jan 15, 2025 19:59:35.133171082 CET44550082165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:35.133229971 CET50081445192.168.2.9165.49.37.175
                                      Jan 15, 2025 19:59:35.133264065 CET50082445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:35.133299112 CET50082445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:35.133579016 CET50083445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:35.138225079 CET44550082165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:35.138350964 CET44550083165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:35.138432026 CET50082445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:35.138454914 CET50083445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:35.138490915 CET50083445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:35.143285990 CET44550083165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:35.323918104 CET50084445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:35.328903913 CET44550084188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:35.332041025 CET50084445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:35.332079887 CET50084445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:35.336952925 CET44550084188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:36.335814953 CET44549858188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:36.335899115 CET49858445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:36.338798046 CET49858445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:36.338926077 CET49858445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:36.343734980 CET44549858188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:36.343750954 CET44549858188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:37.239888906 CET50085445192.168.2.971.134.184.172
                                      Jan 15, 2025 19:59:37.244745970 CET4455008571.134.184.172192.168.2.9
                                      Jan 15, 2025 19:59:37.244824886 CET50085445192.168.2.971.134.184.172
                                      Jan 15, 2025 19:59:37.244899988 CET50085445192.168.2.971.134.184.172
                                      Jan 15, 2025 19:59:37.245223999 CET50086445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:37.250046968 CET4455008671.134.184.1192.168.2.9
                                      Jan 15, 2025 19:59:37.250111103 CET50086445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:37.250233889 CET50086445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:37.250597000 CET50087445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:37.251883984 CET4455008571.134.184.172192.168.2.9
                                      Jan 15, 2025 19:59:37.251936913 CET50085445192.168.2.971.134.184.172
                                      Jan 15, 2025 19:59:37.255141973 CET4455008671.134.184.1192.168.2.9
                                      Jan 15, 2025 19:59:37.255189896 CET50086445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:37.255369902 CET4455008771.134.184.1192.168.2.9
                                      Jan 15, 2025 19:59:37.255431890 CET50087445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:37.255465984 CET50087445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:37.260205984 CET4455008771.134.184.1192.168.2.9
                                      Jan 15, 2025 19:59:37.339843035 CET50088445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:37.344726086 CET4455008879.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:37.344880104 CET50088445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:37.344989061 CET50088445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:37.349719048 CET4455008879.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:38.401521921 CET4454988110.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:38.401602983 CET49881445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:38.401725054 CET49881445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:38.401901007 CET49881445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:38.406470060 CET4454988110.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:38.406691074 CET4454988110.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:39.247806072 CET50089445192.168.2.967.221.200.130
                                      Jan 15, 2025 19:59:39.252648115 CET4455008967.221.200.130192.168.2.9
                                      Jan 15, 2025 19:59:39.252742052 CET50089445192.168.2.967.221.200.130
                                      Jan 15, 2025 19:59:39.252774000 CET50089445192.168.2.967.221.200.130
                                      Jan 15, 2025 19:59:39.252954960 CET50090445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:39.257728100 CET4455008967.221.200.130192.168.2.9
                                      Jan 15, 2025 19:59:39.257778883 CET50089445192.168.2.967.221.200.130
                                      Jan 15, 2025 19:59:39.257797003 CET4455009067.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:39.257853985 CET50090445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:39.257872105 CET50090445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:39.258155107 CET50091445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:39.262784958 CET4455009067.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:39.262850046 CET50090445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:39.262904882 CET4455009167.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:39.262959003 CET50091445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:39.262994051 CET50091445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:39.267739058 CET4455009167.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:39.355001926 CET50092445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:39.359914064 CET44550092188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:39.360049963 CET50092445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:39.360084057 CET50092445192.168.2.9188.195.139.1
                                      Jan 15, 2025 19:59:39.364840031 CET44550092188.195.139.1192.168.2.9
                                      Jan 15, 2025 19:59:40.755093098 CET4455009167.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:40.755182981 CET50091445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:40.755217075 CET50091445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:40.755276918 CET50091445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:40.760899067 CET4455009167.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:40.760911942 CET4455009167.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:40.877868891 CET44549907164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:40.878082037 CET49907445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:40.878153086 CET49907445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:40.878348112 CET49907445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:40.882913113 CET44549907164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:40.883138895 CET44549907164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:41.263355017 CET50093445192.168.2.9215.248.16.182
                                      Jan 15, 2025 19:59:41.268279076 CET44550093215.248.16.182192.168.2.9
                                      Jan 15, 2025 19:59:41.268414974 CET50093445192.168.2.9215.248.16.182
                                      Jan 15, 2025 19:59:41.268636942 CET50093445192.168.2.9215.248.16.182
                                      Jan 15, 2025 19:59:41.268800974 CET50094445192.168.2.9215.248.16.1
                                      Jan 15, 2025 19:59:41.273472071 CET44550093215.248.16.182192.168.2.9
                                      Jan 15, 2025 19:59:41.273561001 CET44550094215.248.16.1192.168.2.9
                                      Jan 15, 2025 19:59:41.273585081 CET50093445192.168.2.9215.248.16.182
                                      Jan 15, 2025 19:59:41.273652077 CET50094445192.168.2.9215.248.16.1
                                      Jan 15, 2025 19:59:41.273797035 CET50094445192.168.2.9215.248.16.1
                                      Jan 15, 2025 19:59:41.274171114 CET50095445192.168.2.9215.248.16.1
                                      Jan 15, 2025 19:59:41.278604984 CET44550094215.248.16.1192.168.2.9
                                      Jan 15, 2025 19:59:41.278682947 CET50094445192.168.2.9215.248.16.1
                                      Jan 15, 2025 19:59:41.278979063 CET44550095215.248.16.1192.168.2.9
                                      Jan 15, 2025 19:59:41.279043913 CET50095445192.168.2.9215.248.16.1
                                      Jan 15, 2025 19:59:41.279081106 CET50095445192.168.2.9215.248.16.1
                                      Jan 15, 2025 19:59:41.283859015 CET44550095215.248.16.1192.168.2.9
                                      Jan 15, 2025 19:59:41.417951107 CET50096445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:41.422846079 CET4455009610.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:41.423002005 CET50096445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:41.423151016 CET50096445192.168.2.910.200.100.1
                                      Jan 15, 2025 19:59:41.427937031 CET4455009610.200.100.1192.168.2.9
                                      Jan 15, 2025 19:59:42.399620056 CET44549928160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:42.399732113 CET49928445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:42.399796963 CET49928445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:42.399851084 CET49928445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:42.404544115 CET44549928160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:42.404593945 CET44549928160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:43.280415058 CET50097445192.168.2.916.102.172.174
                                      Jan 15, 2025 19:59:43.285183907 CET4455009716.102.172.174192.168.2.9
                                      Jan 15, 2025 19:59:43.285294056 CET50097445192.168.2.916.102.172.174
                                      Jan 15, 2025 19:59:43.285331011 CET50097445192.168.2.916.102.172.174
                                      Jan 15, 2025 19:59:43.285521984 CET50098445192.168.2.916.102.172.1
                                      Jan 15, 2025 19:59:43.290266991 CET4455009816.102.172.1192.168.2.9
                                      Jan 15, 2025 19:59:43.290374041 CET4455009716.102.172.174192.168.2.9
                                      Jan 15, 2025 19:59:43.290381908 CET50098445192.168.2.916.102.172.1
                                      Jan 15, 2025 19:59:43.290435076 CET50097445192.168.2.916.102.172.174
                                      Jan 15, 2025 19:59:43.290568113 CET50098445192.168.2.916.102.172.1
                                      Jan 15, 2025 19:59:43.290884972 CET50099445192.168.2.916.102.172.1
                                      Jan 15, 2025 19:59:43.295538902 CET4455009816.102.172.1192.168.2.9
                                      Jan 15, 2025 19:59:43.295593977 CET50098445192.168.2.916.102.172.1
                                      Jan 15, 2025 19:59:43.295646906 CET4455009916.102.172.1192.168.2.9
                                      Jan 15, 2025 19:59:43.295727968 CET50099445192.168.2.916.102.172.1
                                      Jan 15, 2025 19:59:43.295773983 CET50099445192.168.2.916.102.172.1
                                      Jan 15, 2025 19:59:43.300616980 CET4455009916.102.172.1192.168.2.9
                                      Jan 15, 2025 19:59:43.761322975 CET50100445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:43.766757965 CET4455010067.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:43.766875982 CET50100445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:43.766990900 CET50100445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:43.771820068 CET4455010067.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:43.886743069 CET50101445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:43.891618967 CET44550101164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:43.893285990 CET50101445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:43.893383026 CET50101445192.168.2.9164.135.40.1
                                      Jan 15, 2025 19:59:43.898338079 CET44550101164.135.40.1192.168.2.9
                                      Jan 15, 2025 19:59:44.382921934 CET4454995236.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:44.383218050 CET49952445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:44.383425951 CET49952445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:44.383603096 CET49952445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:44.388344049 CET4454995236.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:44.388528109 CET4454995236.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:45.152134895 CET50102445192.168.2.974.8.58.92
                                      Jan 15, 2025 19:59:45.157876015 CET4455010274.8.58.92192.168.2.9
                                      Jan 15, 2025 19:59:45.157972097 CET50102445192.168.2.974.8.58.92
                                      Jan 15, 2025 19:59:45.158008099 CET50102445192.168.2.974.8.58.92
                                      Jan 15, 2025 19:59:45.158122063 CET50103445192.168.2.974.8.58.1
                                      Jan 15, 2025 19:59:45.162981033 CET4455010374.8.58.1192.168.2.9
                                      Jan 15, 2025 19:59:45.163034916 CET50103445192.168.2.974.8.58.1
                                      Jan 15, 2025 19:59:45.163121939 CET4455010274.8.58.92192.168.2.9
                                      Jan 15, 2025 19:59:45.163130045 CET50103445192.168.2.974.8.58.1
                                      Jan 15, 2025 19:59:45.163166046 CET50102445192.168.2.974.8.58.92
                                      Jan 15, 2025 19:59:45.163415909 CET50104445192.168.2.974.8.58.1
                                      Jan 15, 2025 19:59:45.168234110 CET4455010374.8.58.1192.168.2.9
                                      Jan 15, 2025 19:59:45.168253899 CET4455010474.8.58.1192.168.2.9
                                      Jan 15, 2025 19:59:45.168417931 CET50103445192.168.2.974.8.58.1
                                      Jan 15, 2025 19:59:45.168451071 CET50104445192.168.2.974.8.58.1
                                      Jan 15, 2025 19:59:45.168467999 CET50104445192.168.2.974.8.58.1
                                      Jan 15, 2025 19:59:45.174801111 CET4455010474.8.58.1192.168.2.9
                                      Jan 15, 2025 19:59:45.252994061 CET4455010067.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:45.253071070 CET50100445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:45.258685112 CET50100445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:45.258725882 CET50100445192.168.2.967.221.200.1
                                      Jan 15, 2025 19:59:45.323683977 CET50105445192.168.2.967.221.200.2
                                      Jan 15, 2025 19:59:45.401916981 CET50106445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:45.437278032 CET4455010067.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:45.437293053 CET4455010067.221.200.1192.168.2.9
                                      Jan 15, 2025 19:59:45.437302113 CET4455010567.221.200.2192.168.2.9
                                      Jan 15, 2025 19:59:45.437438011 CET50105445192.168.2.967.221.200.2
                                      Jan 15, 2025 19:59:45.437545061 CET50105445192.168.2.967.221.200.2
                                      Jan 15, 2025 19:59:45.437942028 CET50107445192.168.2.967.221.200.2
                                      Jan 15, 2025 19:59:45.438026905 CET44550106160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:45.438086033 CET50106445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:45.438137054 CET50106445192.168.2.9160.106.135.1
                                      Jan 15, 2025 19:59:45.442715883 CET4455010567.221.200.2192.168.2.9
                                      Jan 15, 2025 19:59:45.442727089 CET4455010767.221.200.2192.168.2.9
                                      Jan 15, 2025 19:59:45.442780972 CET50105445192.168.2.967.221.200.2
                                      Jan 15, 2025 19:59:45.442814112 CET50107445192.168.2.967.221.200.2
                                      Jan 15, 2025 19:59:45.442814112 CET50107445192.168.2.967.221.200.2
                                      Jan 15, 2025 19:59:45.442864895 CET44550106160.106.135.1192.168.2.9
                                      Jan 15, 2025 19:59:45.450308084 CET4455010767.221.200.2192.168.2.9
                                      Jan 15, 2025 19:59:46.415369034 CET4454997452.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:46.415606022 CET49974445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:46.415765047 CET49974445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:46.415810108 CET49974445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:46.420619011 CET4454997452.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:46.420630932 CET4454997452.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:46.902434111 CET50108445192.168.2.9153.98.17.100
                                      Jan 15, 2025 19:59:46.907387972 CET44550108153.98.17.100192.168.2.9
                                      Jan 15, 2025 19:59:46.907476902 CET50108445192.168.2.9153.98.17.100
                                      Jan 15, 2025 19:59:46.907546997 CET50108445192.168.2.9153.98.17.100
                                      Jan 15, 2025 19:59:46.907686949 CET50109445192.168.2.9153.98.17.1
                                      Jan 15, 2025 19:59:46.912565947 CET44550109153.98.17.1192.168.2.9
                                      Jan 15, 2025 19:59:46.912635088 CET50109445192.168.2.9153.98.17.1
                                      Jan 15, 2025 19:59:46.912684917 CET50109445192.168.2.9153.98.17.1
                                      Jan 15, 2025 19:59:46.912715912 CET44550108153.98.17.100192.168.2.9
                                      Jan 15, 2025 19:59:46.912761927 CET50108445192.168.2.9153.98.17.100
                                      Jan 15, 2025 19:59:46.913026094 CET50110445192.168.2.9153.98.17.1
                                      Jan 15, 2025 19:59:46.917684078 CET44550109153.98.17.1192.168.2.9
                                      Jan 15, 2025 19:59:46.917795897 CET50109445192.168.2.9153.98.17.1
                                      Jan 15, 2025 19:59:46.917901039 CET44550110153.98.17.1192.168.2.9
                                      Jan 15, 2025 19:59:46.917963028 CET50110445192.168.2.9153.98.17.1
                                      Jan 15, 2025 19:59:46.917996883 CET50110445192.168.2.9153.98.17.1
                                      Jan 15, 2025 19:59:46.922801018 CET44550110153.98.17.1192.168.2.9
                                      Jan 15, 2025 19:59:47.386538982 CET50111445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:47.391393900 CET4455011136.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:47.391474962 CET50111445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:47.391740084 CET50111445192.168.2.936.17.33.1
                                      Jan 15, 2025 19:59:47.396480083 CET4455011136.17.33.1192.168.2.9
                                      Jan 15, 2025 19:59:48.415100098 CET4454999988.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:48.415178061 CET49999445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:48.415211916 CET49999445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:48.415250063 CET49999445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:48.420049906 CET4454999988.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:48.420061111 CET4454999988.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:48.542902946 CET50112445192.168.2.958.65.156.173
                                      Jan 15, 2025 19:59:48.547699928 CET4455011258.65.156.173192.168.2.9
                                      Jan 15, 2025 19:59:48.547782898 CET50112445192.168.2.958.65.156.173
                                      Jan 15, 2025 19:59:48.547843933 CET50112445192.168.2.958.65.156.173
                                      Jan 15, 2025 19:59:48.547966957 CET50113445192.168.2.958.65.156.1
                                      Jan 15, 2025 19:59:48.552723885 CET4455011258.65.156.173192.168.2.9
                                      Jan 15, 2025 19:59:48.552768946 CET4455011358.65.156.1192.168.2.9
                                      Jan 15, 2025 19:59:48.552884102 CET50112445192.168.2.958.65.156.173
                                      Jan 15, 2025 19:59:48.552911043 CET50113445192.168.2.958.65.156.1
                                      Jan 15, 2025 19:59:48.552983046 CET50113445192.168.2.958.65.156.1
                                      Jan 15, 2025 19:59:48.553261995 CET50114445192.168.2.958.65.156.1
                                      Jan 15, 2025 19:59:48.557954073 CET4455011358.65.156.1192.168.2.9
                                      Jan 15, 2025 19:59:48.558007956 CET50113445192.168.2.958.65.156.1
                                      Jan 15, 2025 19:59:48.558131933 CET4455011458.65.156.1192.168.2.9
                                      Jan 15, 2025 19:59:48.558197021 CET50114445192.168.2.958.65.156.1
                                      Jan 15, 2025 19:59:48.558300972 CET50114445192.168.2.958.65.156.1
                                      Jan 15, 2025 19:59:48.563026905 CET4455011458.65.156.1192.168.2.9
                                      Jan 15, 2025 19:59:49.417557955 CET50115445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:49.422322035 CET4455011552.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:49.422413111 CET50115445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:49.422434092 CET50115445192.168.2.952.2.231.1
                                      Jan 15, 2025 19:59:49.427205086 CET4455011552.2.231.1192.168.2.9
                                      Jan 15, 2025 19:59:50.074106932 CET50116445192.168.2.946.96.102.138
                                      Jan 15, 2025 19:59:50.079018116 CET4455011646.96.102.138192.168.2.9
                                      Jan 15, 2025 19:59:50.079118967 CET50116445192.168.2.946.96.102.138
                                      Jan 15, 2025 19:59:50.079201937 CET50116445192.168.2.946.96.102.138
                                      Jan 15, 2025 19:59:50.079355001 CET50117445192.168.2.946.96.102.1
                                      Jan 15, 2025 19:59:50.084165096 CET4455011746.96.102.1192.168.2.9
                                      Jan 15, 2025 19:59:50.084253073 CET50117445192.168.2.946.96.102.1
                                      Jan 15, 2025 19:59:50.084400892 CET4455011646.96.102.138192.168.2.9
                                      Jan 15, 2025 19:59:50.084462881 CET50116445192.168.2.946.96.102.138
                                      Jan 15, 2025 19:59:50.088247061 CET50117445192.168.2.946.96.102.1
                                      Jan 15, 2025 19:59:50.088475943 CET50118445192.168.2.946.96.102.1
                                      Jan 15, 2025 19:59:50.093085051 CET4455011746.96.102.1192.168.2.9
                                      Jan 15, 2025 19:59:50.093146086 CET50117445192.168.2.946.96.102.1
                                      Jan 15, 2025 19:59:50.093292952 CET4455011846.96.102.1192.168.2.9
                                      Jan 15, 2025 19:59:50.093367100 CET50118445192.168.2.946.96.102.1
                                      Jan 15, 2025 19:59:50.093409061 CET50118445192.168.2.946.96.102.1
                                      Jan 15, 2025 19:59:50.098162889 CET4455011846.96.102.1192.168.2.9
                                      Jan 15, 2025 19:59:50.507797003 CET44550024107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:50.507944107 CET50024445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:50.507945061 CET50024445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:50.508013010 CET50024445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:50.514015913 CET44550024107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:50.514157057 CET44550024107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:51.418353081 CET50119445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:51.431891918 CET4455011988.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:51.431967974 CET50119445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:51.432022095 CET50119445192.168.2.988.10.108.1
                                      Jan 15, 2025 19:59:51.438021898 CET4455011988.10.108.1192.168.2.9
                                      Jan 15, 2025 19:59:51.496161938 CET50120445192.168.2.9185.184.157.183
                                      Jan 15, 2025 19:59:51.501040936 CET44550120185.184.157.183192.168.2.9
                                      Jan 15, 2025 19:59:51.501132965 CET50120445192.168.2.9185.184.157.183
                                      Jan 15, 2025 19:59:51.501199007 CET50120445192.168.2.9185.184.157.183
                                      Jan 15, 2025 19:59:51.501400948 CET50121445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:51.506177902 CET44550120185.184.157.183192.168.2.9
                                      Jan 15, 2025 19:59:51.506237030 CET50120445192.168.2.9185.184.157.183
                                      Jan 15, 2025 19:59:51.506285906 CET44550121185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:51.506334066 CET50121445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:51.506369114 CET50121445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:51.506714106 CET50122445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:51.511382103 CET44550121185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:51.511435032 CET50121445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:51.511514902 CET44550122185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:51.511565924 CET50122445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:51.511612892 CET50122445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:51.516372919 CET44550122185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:52.491761923 CET44550048208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:52.491818905 CET50048445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:52.491869926 CET50048445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:52.491913080 CET50048445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:52.496592999 CET44550048208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:52.496607065 CET44550048208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:52.824675083 CET50123445192.168.2.9146.226.127.49
                                      Jan 15, 2025 19:59:52.830662966 CET44550123146.226.127.49192.168.2.9
                                      Jan 15, 2025 19:59:52.830792904 CET50123445192.168.2.9146.226.127.49
                                      Jan 15, 2025 19:59:52.836267948 CET50123445192.168.2.9146.226.127.49
                                      Jan 15, 2025 19:59:52.836483955 CET50124445192.168.2.9146.226.127.1
                                      Jan 15, 2025 19:59:52.843337059 CET44550123146.226.127.49192.168.2.9
                                      Jan 15, 2025 19:59:52.843379021 CET44550123146.226.127.49192.168.2.9
                                      Jan 15, 2025 19:59:52.843411922 CET44550124146.226.127.1192.168.2.9
                                      Jan 15, 2025 19:59:52.843430042 CET50123445192.168.2.9146.226.127.49
                                      Jan 15, 2025 19:59:52.843473911 CET50124445192.168.2.9146.226.127.1
                                      Jan 15, 2025 19:59:52.843554974 CET50124445192.168.2.9146.226.127.1
                                      Jan 15, 2025 19:59:52.843947887 CET50125445192.168.2.9146.226.127.1
                                      Jan 15, 2025 19:59:52.849647045 CET44550124146.226.127.1192.168.2.9
                                      Jan 15, 2025 19:59:52.849678040 CET44550125146.226.127.1192.168.2.9
                                      Jan 15, 2025 19:59:52.849714041 CET50124445192.168.2.9146.226.127.1
                                      Jan 15, 2025 19:59:52.849756002 CET50125445192.168.2.9146.226.127.1
                                      Jan 15, 2025 19:59:52.849800110 CET50125445192.168.2.9146.226.127.1
                                      Jan 15, 2025 19:59:52.855513096 CET44550125146.226.127.1192.168.2.9
                                      Jan 15, 2025 19:59:52.932521105 CET44550122185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:52.932602882 CET50122445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:52.932643890 CET50122445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:52.932688951 CET50122445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:52.937592983 CET44550122185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:52.937623024 CET44550122185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:53.511204004 CET50126445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:53.516087055 CET44550126107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:53.520086050 CET50126445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:53.524594069 CET50126445192.168.2.9107.43.37.1
                                      Jan 15, 2025 19:59:53.529397011 CET44550126107.43.37.1192.168.2.9
                                      Jan 15, 2025 19:59:53.698790073 CET4970580192.168.2.9199.232.210.172
                                      Jan 15, 2025 19:59:53.703761101 CET8049705199.232.210.172192.168.2.9
                                      Jan 15, 2025 19:59:53.704063892 CET4970580192.168.2.9199.232.210.172
                                      Jan 15, 2025 19:59:54.074074984 CET50127445192.168.2.940.72.68.33
                                      Jan 15, 2025 19:59:54.078926086 CET4455012740.72.68.33192.168.2.9
                                      Jan 15, 2025 19:59:54.079022884 CET50127445192.168.2.940.72.68.33
                                      Jan 15, 2025 19:59:54.079066992 CET50127445192.168.2.940.72.68.33
                                      Jan 15, 2025 19:59:54.079277039 CET50128445192.168.2.940.72.68.1
                                      Jan 15, 2025 19:59:54.085062981 CET4455012840.72.68.1192.168.2.9
                                      Jan 15, 2025 19:59:54.085123062 CET50128445192.168.2.940.72.68.1
                                      Jan 15, 2025 19:59:54.085145950 CET50128445192.168.2.940.72.68.1
                                      Jan 15, 2025 19:59:54.085210085 CET4455012740.72.68.33192.168.2.9
                                      Jan 15, 2025 19:59:54.085258007 CET50127445192.168.2.940.72.68.33
                                      Jan 15, 2025 19:59:54.085386038 CET50129445192.168.2.940.72.68.1
                                      Jan 15, 2025 19:59:54.090106010 CET4455012840.72.68.1192.168.2.9
                                      Jan 15, 2025 19:59:54.090142012 CET4455012940.72.68.1192.168.2.9
                                      Jan 15, 2025 19:59:54.090167046 CET50128445192.168.2.940.72.68.1
                                      Jan 15, 2025 19:59:54.090214014 CET50129445192.168.2.940.72.68.1
                                      Jan 15, 2025 19:59:54.090260029 CET50129445192.168.2.940.72.68.1
                                      Jan 15, 2025 19:59:54.095019102 CET4455012940.72.68.1192.168.2.9
                                      Jan 15, 2025 19:59:54.491431952 CET44550071106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:54.491502047 CET50071445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:54.491539955 CET50071445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:54.491586924 CET50071445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:54.496444941 CET44550071106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:54.496476889 CET44550071106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:54.731731892 CET4455007542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:54.731806040 CET50075445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:54.731908083 CET50075445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:54.732014894 CET50075445192.168.2.942.230.216.1
                                      Jan 15, 2025 19:59:54.736742020 CET4455007542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:54.736830950 CET4455007542.230.216.1192.168.2.9
                                      Jan 15, 2025 19:59:54.799814939 CET50130445192.168.2.942.230.216.2
                                      Jan 15, 2025 19:59:54.804609060 CET4455013042.230.216.2192.168.2.9
                                      Jan 15, 2025 19:59:54.804671049 CET50130445192.168.2.942.230.216.2
                                      Jan 15, 2025 19:59:54.804852962 CET50130445192.168.2.942.230.216.2
                                      Jan 15, 2025 19:59:54.805526972 CET50131445192.168.2.942.230.216.2
                                      Jan 15, 2025 19:59:54.809701920 CET4455013042.230.216.2192.168.2.9
                                      Jan 15, 2025 19:59:54.809752941 CET50130445192.168.2.942.230.216.2
                                      Jan 15, 2025 19:59:54.810481071 CET4455013142.230.216.2192.168.2.9
                                      Jan 15, 2025 19:59:54.810538054 CET50131445192.168.2.942.230.216.2
                                      Jan 15, 2025 19:59:54.810637951 CET50131445192.168.2.942.230.216.2
                                      Jan 15, 2025 19:59:54.815440893 CET4455013142.230.216.2192.168.2.9
                                      Jan 15, 2025 19:59:55.377441883 CET50132445192.168.2.9191.133.120.75
                                      Jan 15, 2025 19:59:55.382302046 CET44550132191.133.120.75192.168.2.9
                                      Jan 15, 2025 19:59:55.382366896 CET50132445192.168.2.9191.133.120.75
                                      Jan 15, 2025 19:59:55.382412910 CET50132445192.168.2.9191.133.120.75
                                      Jan 15, 2025 19:59:55.382579088 CET50133445192.168.2.9191.133.120.1
                                      Jan 15, 2025 19:59:55.387398958 CET44550132191.133.120.75192.168.2.9
                                      Jan 15, 2025 19:59:55.387415886 CET44550133191.133.120.1192.168.2.9
                                      Jan 15, 2025 19:59:55.387476921 CET50132445192.168.2.9191.133.120.75
                                      Jan 15, 2025 19:59:55.387511015 CET50133445192.168.2.9191.133.120.1
                                      Jan 15, 2025 19:59:55.387609005 CET50133445192.168.2.9191.133.120.1
                                      Jan 15, 2025 19:59:55.390599966 CET50134445192.168.2.9191.133.120.1
                                      Jan 15, 2025 19:59:55.392510891 CET44550133191.133.120.1192.168.2.9
                                      Jan 15, 2025 19:59:55.393511057 CET50133445192.168.2.9191.133.120.1
                                      Jan 15, 2025 19:59:55.395390034 CET44550134191.133.120.1192.168.2.9
                                      Jan 15, 2025 19:59:55.395500898 CET50134445192.168.2.9191.133.120.1
                                      Jan 15, 2025 19:59:55.395529032 CET50134445192.168.2.9191.133.120.1
                                      Jan 15, 2025 19:59:55.400317907 CET44550134191.133.120.1192.168.2.9
                                      Jan 15, 2025 19:59:55.496114016 CET50135445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:55.501087904 CET44550135208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:55.501152992 CET50135445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:55.501190901 CET50135445192.168.2.9208.156.168.1
                                      Jan 15, 2025 19:59:55.505996943 CET44550135208.156.168.1192.168.2.9
                                      Jan 15, 2025 19:59:55.933254957 CET50136445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:55.938312054 CET44550136185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:55.939342976 CET50136445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:55.939342976 CET50136445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:55.944228888 CET44550136185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:56.467164993 CET50138445192.168.2.982.250.219.42
                                      Jan 15, 2025 19:59:56.472261906 CET4455013882.250.219.42192.168.2.9
                                      Jan 15, 2025 19:59:56.472363949 CET50138445192.168.2.982.250.219.42
                                      Jan 15, 2025 19:59:56.472429991 CET50138445192.168.2.982.250.219.42
                                      Jan 15, 2025 19:59:56.472549915 CET50139445192.168.2.982.250.219.1
                                      Jan 15, 2025 19:59:56.477416039 CET4455013882.250.219.42192.168.2.9
                                      Jan 15, 2025 19:59:56.477475882 CET4455013982.250.219.1192.168.2.9
                                      Jan 15, 2025 19:59:56.477493048 CET50138445192.168.2.982.250.219.42
                                      Jan 15, 2025 19:59:56.477549076 CET50139445192.168.2.982.250.219.1
                                      Jan 15, 2025 19:59:56.477597952 CET50139445192.168.2.982.250.219.1
                                      Jan 15, 2025 19:59:56.479202986 CET50140445192.168.2.982.250.219.1
                                      Jan 15, 2025 19:59:56.482548952 CET4455013982.250.219.1192.168.2.9
                                      Jan 15, 2025 19:59:56.482608080 CET50139445192.168.2.982.250.219.1
                                      Jan 15, 2025 19:59:56.484191895 CET4455014082.250.219.1192.168.2.9
                                      Jan 15, 2025 19:59:56.484261036 CET50140445192.168.2.982.250.219.1
                                      Jan 15, 2025 19:59:56.484348059 CET50140445192.168.2.982.250.219.1
                                      Jan 15, 2025 19:59:56.489121914 CET4455014082.250.219.1192.168.2.9
                                      Jan 15, 2025 19:59:56.495795965 CET44550083165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:56.495888948 CET50083445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:56.495888948 CET50083445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:56.495934963 CET50083445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:56.500871897 CET44550083165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:56.500902891 CET44550083165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:56.694932938 CET44550084188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:56.695014954 CET50084445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:56.695085049 CET50084445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:56.695157051 CET50084445192.168.2.9188.75.188.1
                                      Jan 15, 2025 19:59:56.699881077 CET44550084188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:56.699991941 CET44550084188.75.188.1192.168.2.9
                                      Jan 15, 2025 19:59:56.761359930 CET50141445192.168.2.9188.75.188.2
                                      Jan 15, 2025 19:59:56.766180992 CET44550141188.75.188.2192.168.2.9
                                      Jan 15, 2025 19:59:56.766249895 CET50141445192.168.2.9188.75.188.2
                                      Jan 15, 2025 19:59:56.766305923 CET50141445192.168.2.9188.75.188.2
                                      Jan 15, 2025 19:59:56.766649961 CET50142445192.168.2.9188.75.188.2
                                      Jan 15, 2025 19:59:56.771439075 CET44550141188.75.188.2192.168.2.9
                                      Jan 15, 2025 19:59:56.771455050 CET44550142188.75.188.2192.168.2.9
                                      Jan 15, 2025 19:59:56.771486998 CET50141445192.168.2.9188.75.188.2
                                      Jan 15, 2025 19:59:56.771532059 CET50142445192.168.2.9188.75.188.2
                                      Jan 15, 2025 19:59:56.771557093 CET50142445192.168.2.9188.75.188.2
                                      Jan 15, 2025 19:59:56.776351929 CET44550142188.75.188.2192.168.2.9
                                      Jan 15, 2025 19:59:57.322724104 CET44550136185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:57.322829962 CET50136445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:57.322895050 CET50136445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:57.322935104 CET50136445192.168.2.9185.184.157.1
                                      Jan 15, 2025 19:59:57.327837944 CET44550136185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:57.327869892 CET44550136185.184.157.1192.168.2.9
                                      Jan 15, 2025 19:59:57.386313915 CET50143445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:57.391158104 CET44550143185.184.157.2192.168.2.9
                                      Jan 15, 2025 19:59:57.391828060 CET50143445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:57.391896963 CET50143445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:57.392308950 CET50144445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:57.396914005 CET44550143185.184.157.2192.168.2.9
                                      Jan 15, 2025 19:59:57.397037983 CET50143445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:57.397069931 CET44550144185.184.157.2192.168.2.9
                                      Jan 15, 2025 19:59:57.397134066 CET50144445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:57.397239923 CET50144445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:57.402044058 CET44550144185.184.157.2192.168.2.9
                                      Jan 15, 2025 19:59:57.483194113 CET50145445192.168.2.927.16.134.176
                                      Jan 15, 2025 19:59:57.488446951 CET4455014527.16.134.176192.168.2.9
                                      Jan 15, 2025 19:59:57.488544941 CET50145445192.168.2.927.16.134.176
                                      Jan 15, 2025 19:59:57.488616943 CET50145445192.168.2.927.16.134.176
                                      Jan 15, 2025 19:59:57.488771915 CET50146445192.168.2.927.16.134.1
                                      Jan 15, 2025 19:59:57.494119883 CET4455014627.16.134.1192.168.2.9
                                      Jan 15, 2025 19:59:57.494272947 CET4455014527.16.134.176192.168.2.9
                                      Jan 15, 2025 19:59:57.494360924 CET50145445192.168.2.927.16.134.176
                                      Jan 15, 2025 19:59:57.494360924 CET50146445192.168.2.927.16.134.1
                                      Jan 15, 2025 19:59:57.494431973 CET50146445192.168.2.927.16.134.1
                                      Jan 15, 2025 19:59:57.494791985 CET50147445192.168.2.927.16.134.1
                                      Jan 15, 2025 19:59:57.495423079 CET50148445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:57.499851942 CET4455014627.16.134.1192.168.2.9
                                      Jan 15, 2025 19:59:57.499933004 CET50146445192.168.2.927.16.134.1
                                      Jan 15, 2025 19:59:57.500199080 CET4455014727.16.134.1192.168.2.9
                                      Jan 15, 2025 19:59:57.500287056 CET50147445192.168.2.927.16.134.1
                                      Jan 15, 2025 19:59:57.500334978 CET50147445192.168.2.927.16.134.1
                                      Jan 15, 2025 19:59:57.500711918 CET44550148106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:57.500777960 CET50148445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:57.500821114 CET50148445192.168.2.9106.99.254.1
                                      Jan 15, 2025 19:59:57.505624056 CET4455014727.16.134.1192.168.2.9
                                      Jan 15, 2025 19:59:57.505834103 CET44550148106.99.254.1192.168.2.9
                                      Jan 15, 2025 19:59:58.434262037 CET50149445192.168.2.9119.254.172.154
                                      Jan 15, 2025 19:59:58.439137936 CET44550149119.254.172.154192.168.2.9
                                      Jan 15, 2025 19:59:58.439335108 CET50149445192.168.2.9119.254.172.154
                                      Jan 15, 2025 19:59:58.439335108 CET50149445192.168.2.9119.254.172.154
                                      Jan 15, 2025 19:59:58.439460993 CET50150445192.168.2.9119.254.172.1
                                      Jan 15, 2025 19:59:58.444288015 CET44550150119.254.172.1192.168.2.9
                                      Jan 15, 2025 19:59:58.444303036 CET44550149119.254.172.154192.168.2.9
                                      Jan 15, 2025 19:59:58.444344997 CET50150445192.168.2.9119.254.172.1
                                      Jan 15, 2025 19:59:58.444448948 CET50150445192.168.2.9119.254.172.1
                                      Jan 15, 2025 19:59:58.444736004 CET50151445192.168.2.9119.254.172.1
                                      Jan 15, 2025 19:59:58.445322990 CET50149445192.168.2.9119.254.172.154
                                      Jan 15, 2025 19:59:58.449330091 CET44550150119.254.172.1192.168.2.9
                                      Jan 15, 2025 19:59:58.449381113 CET50150445192.168.2.9119.254.172.1
                                      Jan 15, 2025 19:59:58.449551105 CET44550151119.254.172.1192.168.2.9
                                      Jan 15, 2025 19:59:58.449611902 CET50151445192.168.2.9119.254.172.1
                                      Jan 15, 2025 19:59:58.449642897 CET50151445192.168.2.9119.254.172.1
                                      Jan 15, 2025 19:59:58.454365015 CET44550151119.254.172.1192.168.2.9
                                      Jan 15, 2025 19:59:58.651793957 CET4455008771.134.184.1192.168.2.9
                                      Jan 15, 2025 19:59:58.651878119 CET50087445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:58.651953936 CET50087445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:58.651981115 CET50087445192.168.2.971.134.184.1
                                      Jan 15, 2025 19:59:58.656728983 CET4455008771.134.184.1192.168.2.9
                                      Jan 15, 2025 19:59:58.656743050 CET4455008771.134.184.1192.168.2.9
                                      Jan 15, 2025 19:59:58.714652061 CET4455008879.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:58.714713097 CET50088445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:58.714778900 CET50088445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:58.714843988 CET50088445192.168.2.979.172.32.1
                                      Jan 15, 2025 19:59:58.719686985 CET4455008879.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:58.719716072 CET4455008879.172.32.1192.168.2.9
                                      Jan 15, 2025 19:59:58.776967049 CET50152445192.168.2.979.172.32.2
                                      Jan 15, 2025 19:59:58.781858921 CET4455015279.172.32.2192.168.2.9
                                      Jan 15, 2025 19:59:58.782871962 CET50152445192.168.2.979.172.32.2
                                      Jan 15, 2025 19:59:58.782923937 CET50152445192.168.2.979.172.32.2
                                      Jan 15, 2025 19:59:58.783253908 CET50153445192.168.2.979.172.32.2
                                      Jan 15, 2025 19:59:58.787883997 CET4455015279.172.32.2192.168.2.9
                                      Jan 15, 2025 19:59:58.788161039 CET4455015379.172.32.2192.168.2.9
                                      Jan 15, 2025 19:59:58.788213015 CET50152445192.168.2.979.172.32.2
                                      Jan 15, 2025 19:59:58.788242102 CET50153445192.168.2.979.172.32.2
                                      Jan 15, 2025 19:59:58.788265944 CET50153445192.168.2.979.172.32.2
                                      Jan 15, 2025 19:59:58.794420004 CET4455015379.172.32.2192.168.2.9
                                      Jan 15, 2025 19:59:58.809159040 CET44550144185.184.157.2192.168.2.9
                                      Jan 15, 2025 19:59:58.811500072 CET50144445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:58.811546087 CET50144445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:58.811602116 CET50144445192.168.2.9185.184.157.2
                                      Jan 15, 2025 19:59:58.816328049 CET44550144185.184.157.2192.168.2.9
                                      Jan 15, 2025 19:59:58.816435099 CET44550144185.184.157.2192.168.2.9
                                      Jan 15, 2025 19:59:59.308532953 CET50154445192.168.2.917.137.98.241
                                      Jan 15, 2025 19:59:59.313374043 CET4455015417.137.98.241192.168.2.9
                                      Jan 15, 2025 19:59:59.313453913 CET50154445192.168.2.917.137.98.241
                                      Jan 15, 2025 19:59:59.313472033 CET50154445192.168.2.917.137.98.241
                                      Jan 15, 2025 19:59:59.313606977 CET50155445192.168.2.917.137.98.1
                                      Jan 15, 2025 19:59:59.318412066 CET4455015517.137.98.1192.168.2.9
                                      Jan 15, 2025 19:59:59.318475008 CET50155445192.168.2.917.137.98.1
                                      Jan 15, 2025 19:59:59.318492889 CET50155445192.168.2.917.137.98.1
                                      Jan 15, 2025 19:59:59.318567038 CET4455015417.137.98.241192.168.2.9
                                      Jan 15, 2025 19:59:59.318615913 CET50154445192.168.2.917.137.98.241
                                      Jan 15, 2025 19:59:59.318834066 CET50156445192.168.2.917.137.98.1
                                      Jan 15, 2025 19:59:59.323410034 CET4455015517.137.98.1192.168.2.9
                                      Jan 15, 2025 19:59:59.323472023 CET50155445192.168.2.917.137.98.1
                                      Jan 15, 2025 19:59:59.323626041 CET4455015617.137.98.1192.168.2.9
                                      Jan 15, 2025 19:59:59.323674917 CET50156445192.168.2.917.137.98.1
                                      Jan 15, 2025 19:59:59.323699951 CET50156445192.168.2.917.137.98.1
                                      Jan 15, 2025 19:59:59.328465939 CET4455015617.137.98.1192.168.2.9
                                      Jan 15, 2025 19:59:59.511212111 CET50157445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:59.516149044 CET44550157165.49.37.1192.168.2.9
                                      Jan 15, 2025 19:59:59.516238928 CET50157445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:59.516313076 CET50157445192.168.2.9165.49.37.1
                                      Jan 15, 2025 19:59:59.521095991 CET44550157165.49.37.1192.168.2.9
                                      Jan 15, 2025 20:00:00.136915922 CET50158445192.168.2.9201.41.62.109
                                      Jan 15, 2025 20:00:00.142023087 CET44550158201.41.62.109192.168.2.9
                                      Jan 15, 2025 20:00:00.142159939 CET50158445192.168.2.9201.41.62.109
                                      Jan 15, 2025 20:00:00.142196894 CET50158445192.168.2.9201.41.62.109
                                      Jan 15, 2025 20:00:00.142359972 CET50159445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:00.147286892 CET44550159201.41.62.1192.168.2.9
                                      Jan 15, 2025 20:00:00.147341013 CET44550158201.41.62.109192.168.2.9
                                      Jan 15, 2025 20:00:00.147392035 CET50159445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:00.147392035 CET50159445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:00.147399902 CET50158445192.168.2.9201.41.62.109
                                      Jan 15, 2025 20:00:00.147670031 CET50160445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:00.152446985 CET44550159201.41.62.1192.168.2.9
                                      Jan 15, 2025 20:00:00.152503967 CET44550160201.41.62.1192.168.2.9
                                      Jan 15, 2025 20:00:00.152508974 CET50159445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:00.152578115 CET50160445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:00.152620077 CET50160445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:00.157474041 CET44550160201.41.62.1192.168.2.9
                                      Jan 15, 2025 20:00:00.712291002 CET44550092188.195.139.1192.168.2.9
                                      Jan 15, 2025 20:00:00.712377071 CET50092445192.168.2.9188.195.139.1
                                      Jan 15, 2025 20:00:00.714682102 CET50092445192.168.2.9188.195.139.1
                                      Jan 15, 2025 20:00:00.714757919 CET50092445192.168.2.9188.195.139.1
                                      Jan 15, 2025 20:00:00.719575882 CET44550092188.195.139.1192.168.2.9
                                      Jan 15, 2025 20:00:00.719594955 CET44550092188.195.139.1192.168.2.9
                                      Jan 15, 2025 20:00:00.781405926 CET50161445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:00.786328077 CET44550161188.195.139.2192.168.2.9
                                      Jan 15, 2025 20:00:00.786417961 CET50161445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:00.789108992 CET50161445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:00.794174910 CET44550161188.195.139.2192.168.2.9
                                      Jan 15, 2025 20:00:00.794249058 CET50161445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:00.891808987 CET50162445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:00.896759033 CET44550162188.195.139.2192.168.2.9
                                      Jan 15, 2025 20:00:00.896830082 CET50162445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:00.899384975 CET50162445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:00.904226065 CET44550162188.195.139.2192.168.2.9
                                      Jan 15, 2025 20:00:00.982275963 CET50163445192.168.2.9143.249.87.243
                                      Jan 15, 2025 20:00:00.987391949 CET44550163143.249.87.243192.168.2.9
                                      Jan 15, 2025 20:00:00.987471104 CET50163445192.168.2.9143.249.87.243
                                      Jan 15, 2025 20:00:00.987524986 CET50163445192.168.2.9143.249.87.243
                                      Jan 15, 2025 20:00:00.987718105 CET50164445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:00.992461920 CET44550163143.249.87.243192.168.2.9
                                      Jan 15, 2025 20:00:00.992520094 CET50163445192.168.2.9143.249.87.243
                                      Jan 15, 2025 20:00:00.992561102 CET44550164143.249.87.1192.168.2.9
                                      Jan 15, 2025 20:00:00.992626905 CET50164445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:00.992747068 CET50164445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:00.993179083 CET50165445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:00.997633934 CET44550164143.249.87.1192.168.2.9
                                      Jan 15, 2025 20:00:00.997805119 CET50164445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:00.998039007 CET44550165143.249.87.1192.168.2.9
                                      Jan 15, 2025 20:00:00.998136997 CET50165445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:00.998178959 CET50165445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:01.003016949 CET44550165143.249.87.1192.168.2.9
                                      Jan 15, 2025 20:00:01.667414904 CET50166445192.168.2.971.134.184.1
                                      Jan 15, 2025 20:00:01.672250986 CET4455016671.134.184.1192.168.2.9
                                      Jan 15, 2025 20:00:01.672322989 CET50166445192.168.2.971.134.184.1
                                      Jan 15, 2025 20:00:01.672352076 CET50166445192.168.2.971.134.184.1
                                      Jan 15, 2025 20:00:01.677161932 CET4455016671.134.184.1192.168.2.9
                                      Jan 15, 2025 20:00:01.823904037 CET50168445192.168.2.9185.184.157.2
                                      Jan 15, 2025 20:00:01.828957081 CET44550168185.184.157.2192.168.2.9
                                      Jan 15, 2025 20:00:01.829085112 CET50168445192.168.2.9185.184.157.2
                                      Jan 15, 2025 20:00:01.829138041 CET50168445192.168.2.9185.184.157.2
                                      Jan 15, 2025 20:00:01.834045887 CET44550168185.184.157.2192.168.2.9
                                      Jan 15, 2025 20:00:02.648085117 CET44550095215.248.16.1192.168.2.9
                                      Jan 15, 2025 20:00:02.648232937 CET50095445192.168.2.9215.248.16.1
                                      Jan 15, 2025 20:00:02.648356915 CET50095445192.168.2.9215.248.16.1
                                      Jan 15, 2025 20:00:02.648356915 CET50095445192.168.2.9215.248.16.1
                                      Jan 15, 2025 20:00:02.653247118 CET44550095215.248.16.1192.168.2.9
                                      Jan 15, 2025 20:00:02.653261900 CET44550095215.248.16.1192.168.2.9
                                      Jan 15, 2025 20:00:02.794547081 CET4455009610.200.100.1192.168.2.9
                                      Jan 15, 2025 20:00:02.794645071 CET50096445192.168.2.910.200.100.1
                                      Jan 15, 2025 20:00:02.794708967 CET50096445192.168.2.910.200.100.1
                                      Jan 15, 2025 20:00:02.794786930 CET50096445192.168.2.910.200.100.1
                                      Jan 15, 2025 20:00:02.799834967 CET4455009610.200.100.1192.168.2.9
                                      Jan 15, 2025 20:00:02.799885988 CET4455009610.200.100.1192.168.2.9
                                      Jan 15, 2025 20:00:02.855041027 CET50171445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:02.859942913 CET4455017110.200.100.2192.168.2.9
                                      Jan 15, 2025 20:00:02.860016108 CET50171445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:02.860048056 CET50171445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:02.860421896 CET50172445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:02.865151882 CET4455017110.200.100.2192.168.2.9
                                      Jan 15, 2025 20:00:02.865206003 CET50171445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:02.865269899 CET4455017210.200.100.2192.168.2.9
                                      Jan 15, 2025 20:00:02.865324974 CET50172445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:02.865359068 CET50172445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:02.870126963 CET4455017210.200.100.2192.168.2.9
                                      Jan 15, 2025 20:00:03.213499069 CET44550168185.184.157.2192.168.2.9
                                      Jan 15, 2025 20:00:03.213593006 CET50168445192.168.2.9185.184.157.2
                                      Jan 15, 2025 20:00:03.213654995 CET50168445192.168.2.9185.184.157.2
                                      Jan 15, 2025 20:00:03.213670015 CET50168445192.168.2.9185.184.157.2
                                      Jan 15, 2025 20:00:03.218554020 CET44550168185.184.157.2192.168.2.9
                                      Jan 15, 2025 20:00:03.218575954 CET44550168185.184.157.2192.168.2.9
                                      Jan 15, 2025 20:00:03.276961088 CET50174445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:03.281908989 CET44550174185.184.157.3192.168.2.9
                                      Jan 15, 2025 20:00:03.282147884 CET50174445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:03.282252073 CET50174445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:03.282603979 CET50175445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:03.287231922 CET44550174185.184.157.3192.168.2.9
                                      Jan 15, 2025 20:00:03.287334919 CET50174445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:03.287411928 CET44550175185.184.157.3192.168.2.9
                                      Jan 15, 2025 20:00:03.287477970 CET50175445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:03.287511110 CET50175445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:03.292258978 CET44550175185.184.157.3192.168.2.9
                                      Jan 15, 2025 20:00:04.664916992 CET4455009916.102.172.1192.168.2.9
                                      Jan 15, 2025 20:00:04.665133953 CET50099445192.168.2.916.102.172.1
                                      Jan 15, 2025 20:00:04.665237904 CET50099445192.168.2.916.102.172.1
                                      Jan 15, 2025 20:00:04.665237904 CET50099445192.168.2.916.102.172.1
                                      Jan 15, 2025 20:00:04.671238899 CET4455009916.102.172.1192.168.2.9
                                      Jan 15, 2025 20:00:04.671778917 CET4455009916.102.172.1192.168.2.9
                                      Jan 15, 2025 20:00:05.257652044 CET44550101164.135.40.1192.168.2.9
                                      Jan 15, 2025 20:00:05.260083914 CET50101445192.168.2.9164.135.40.1
                                      Jan 15, 2025 20:00:05.260171890 CET50101445192.168.2.9164.135.40.1
                                      Jan 15, 2025 20:00:05.260240078 CET50101445192.168.2.9164.135.40.1
                                      Jan 15, 2025 20:00:05.265139103 CET44550101164.135.40.1192.168.2.9
                                      Jan 15, 2025 20:00:05.265158892 CET44550101164.135.40.1192.168.2.9
                                      Jan 15, 2025 20:00:05.323956966 CET50188445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:05.328958035 CET44550188164.135.40.2192.168.2.9
                                      Jan 15, 2025 20:00:05.332096100 CET50188445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:05.332119942 CET50188445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:05.332489014 CET50189445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:05.337193012 CET44550188164.135.40.2192.168.2.9
                                      Jan 15, 2025 20:00:05.337455034 CET44550189164.135.40.2192.168.2.9
                                      Jan 15, 2025 20:00:05.337505102 CET50188445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:05.337538958 CET50189445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:05.337574005 CET50189445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:05.343293905 CET44550189164.135.40.2192.168.2.9
                                      Jan 15, 2025 20:00:05.652239084 CET50191445192.168.2.9215.248.16.1
                                      Jan 15, 2025 20:00:05.657314062 CET44550191215.248.16.1192.168.2.9
                                      Jan 15, 2025 20:00:05.660121918 CET50191445192.168.2.9215.248.16.1
                                      Jan 15, 2025 20:00:05.662925005 CET50191445192.168.2.9215.248.16.1
                                      Jan 15, 2025 20:00:05.667762995 CET44550191215.248.16.1192.168.2.9
                                      Jan 15, 2025 20:00:06.540999889 CET4455010474.8.58.1192.168.2.9
                                      Jan 15, 2025 20:00:06.541096926 CET50104445192.168.2.974.8.58.1
                                      Jan 15, 2025 20:00:06.542848110 CET50104445192.168.2.974.8.58.1
                                      Jan 15, 2025 20:00:06.542893887 CET50104445192.168.2.974.8.58.1
                                      Jan 15, 2025 20:00:06.547760010 CET4455010474.8.58.1192.168.2.9
                                      Jan 15, 2025 20:00:06.547776937 CET4455010474.8.58.1192.168.2.9
                                      Jan 15, 2025 20:00:06.804445982 CET44550106160.106.135.1192.168.2.9
                                      Jan 15, 2025 20:00:06.804539919 CET50106445192.168.2.9160.106.135.1
                                      Jan 15, 2025 20:00:06.804626942 CET50106445192.168.2.9160.106.135.1
                                      Jan 15, 2025 20:00:06.804626942 CET50106445192.168.2.9160.106.135.1
                                      Jan 15, 2025 20:00:06.809539080 CET44550106160.106.135.1192.168.2.9
                                      Jan 15, 2025 20:00:06.809556007 CET44550106160.106.135.1192.168.2.9
                                      Jan 15, 2025 20:00:06.820234060 CET4455010767.221.200.2192.168.2.9
                                      Jan 15, 2025 20:00:06.820311069 CET50107445192.168.2.967.221.200.2
                                      Jan 15, 2025 20:00:06.820388079 CET50107445192.168.2.967.221.200.2
                                      Jan 15, 2025 20:00:06.820388079 CET50107445192.168.2.967.221.200.2
                                      Jan 15, 2025 20:00:06.825294971 CET4455010767.221.200.2192.168.2.9
                                      Jan 15, 2025 20:00:06.825310946 CET4455010767.221.200.2192.168.2.9
                                      Jan 15, 2025 20:00:06.870603085 CET50204445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:06.875560045 CET44550204160.106.135.2192.168.2.9
                                      Jan 15, 2025 20:00:06.875639915 CET50204445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:06.875677109 CET50204445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:06.876017094 CET50205445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:06.880665064 CET44550204160.106.135.2192.168.2.9
                                      Jan 15, 2025 20:00:06.880723000 CET50204445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:06.880872011 CET44550205160.106.135.2192.168.2.9
                                      Jan 15, 2025 20:00:06.881247997 CET50205445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:06.881247997 CET50205445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:06.886014938 CET44550205160.106.135.2192.168.2.9
                                      Jan 15, 2025 20:00:07.667642117 CET50216445192.168.2.916.102.172.1
                                      Jan 15, 2025 20:00:07.672617912 CET4455021616.102.172.1192.168.2.9
                                      Jan 15, 2025 20:00:07.672722101 CET50216445192.168.2.916.102.172.1
                                      Jan 15, 2025 20:00:07.672756910 CET50216445192.168.2.916.102.172.1
                                      Jan 15, 2025 20:00:07.677577019 CET4455021616.102.172.1192.168.2.9
                                      Jan 15, 2025 20:00:08.273372889 CET44550110153.98.17.1192.168.2.9
                                      Jan 15, 2025 20:00:08.273614883 CET50110445192.168.2.9153.98.17.1
                                      Jan 15, 2025 20:00:08.273614883 CET50110445192.168.2.9153.98.17.1
                                      Jan 15, 2025 20:00:08.273614883 CET50110445192.168.2.9153.98.17.1
                                      Jan 15, 2025 20:00:08.278592110 CET44550110153.98.17.1192.168.2.9
                                      Jan 15, 2025 20:00:08.278604984 CET44550110153.98.17.1192.168.2.9
                                      Jan 15, 2025 20:00:08.777105093 CET4455011136.17.33.1192.168.2.9
                                      Jan 15, 2025 20:00:08.777183056 CET50111445192.168.2.936.17.33.1
                                      Jan 15, 2025 20:00:08.777231932 CET50111445192.168.2.936.17.33.1
                                      Jan 15, 2025 20:00:08.777276039 CET50111445192.168.2.936.17.33.1
                                      Jan 15, 2025 20:00:08.782095909 CET4455011136.17.33.1192.168.2.9
                                      Jan 15, 2025 20:00:08.782126904 CET4455011136.17.33.1192.168.2.9
                                      Jan 15, 2025 20:00:08.839401007 CET50235445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:08.845042944 CET4455023536.17.33.2192.168.2.9
                                      Jan 15, 2025 20:00:08.845179081 CET50235445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:08.845180035 CET50235445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:08.845508099 CET50236445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:08.850425959 CET4455023536.17.33.2192.168.2.9
                                      Jan 15, 2025 20:00:08.850506067 CET50235445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:08.850620985 CET4455023636.17.33.2192.168.2.9
                                      Jan 15, 2025 20:00:08.850684881 CET50236445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:08.850727081 CET50236445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:08.856811047 CET4455023636.17.33.2192.168.2.9
                                      Jan 15, 2025 20:00:09.558238983 CET50251445192.168.2.974.8.58.1
                                      Jan 15, 2025 20:00:09.563420057 CET4455025174.8.58.1192.168.2.9
                                      Jan 15, 2025 20:00:09.563513041 CET50251445192.168.2.974.8.58.1
                                      Jan 15, 2025 20:00:09.563513041 CET50251445192.168.2.974.8.58.1
                                      Jan 15, 2025 20:00:09.568377018 CET4455025174.8.58.1192.168.2.9
                                      Jan 15, 2025 20:00:09.823815107 CET50260445192.168.2.967.221.200.2
                                      Jan 15, 2025 20:00:09.829030037 CET4455026067.221.200.2192.168.2.9
                                      Jan 15, 2025 20:00:09.829169989 CET50260445192.168.2.967.221.200.2
                                      Jan 15, 2025 20:00:09.829222918 CET50260445192.168.2.967.221.200.2
                                      Jan 15, 2025 20:00:09.834167957 CET4455026067.221.200.2192.168.2.9
                                      Jan 15, 2025 20:00:09.915802956 CET4455011458.65.156.1192.168.2.9
                                      Jan 15, 2025 20:00:09.916064024 CET50114445192.168.2.958.65.156.1
                                      Jan 15, 2025 20:00:09.916282892 CET50114445192.168.2.958.65.156.1
                                      Jan 15, 2025 20:00:09.916282892 CET50114445192.168.2.958.65.156.1
                                      Jan 15, 2025 20:00:09.921153069 CET4455011458.65.156.1192.168.2.9
                                      Jan 15, 2025 20:00:09.921216965 CET4455011458.65.156.1192.168.2.9
                                      Jan 15, 2025 20:00:10.788965940 CET4455011552.2.231.1192.168.2.9
                                      Jan 15, 2025 20:00:10.789071083 CET50115445192.168.2.952.2.231.1
                                      Jan 15, 2025 20:00:10.789122105 CET50115445192.168.2.952.2.231.1
                                      Jan 15, 2025 20:00:10.789166927 CET50115445192.168.2.952.2.231.1
                                      Jan 15, 2025 20:00:10.794064999 CET4455011552.2.231.1192.168.2.9
                                      Jan 15, 2025 20:00:10.794133902 CET4455011552.2.231.1192.168.2.9
                                      Jan 15, 2025 20:00:10.855145931 CET50292445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:10.860301018 CET4455029252.2.231.2192.168.2.9
                                      Jan 15, 2025 20:00:10.860400915 CET50292445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:10.860465050 CET50292445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:10.861325026 CET50293445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:10.865693092 CET4455029252.2.231.2192.168.2.9
                                      Jan 15, 2025 20:00:10.865782976 CET50292445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:10.866257906 CET4455029352.2.231.2192.168.2.9
                                      Jan 15, 2025 20:00:10.866333008 CET50293445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:10.866374016 CET50293445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:10.871212006 CET4455029352.2.231.2192.168.2.9
                                      Jan 15, 2025 20:00:11.276973963 CET50307445192.168.2.9153.98.17.1
                                      Jan 15, 2025 20:00:11.282036066 CET44550307153.98.17.1192.168.2.9
                                      Jan 15, 2025 20:00:11.282151937 CET50307445192.168.2.9153.98.17.1
                                      Jan 15, 2025 20:00:11.282196045 CET50307445192.168.2.9153.98.17.1
                                      Jan 15, 2025 20:00:11.287024975 CET44550307153.98.17.1192.168.2.9
                                      Jan 15, 2025 20:00:11.445333004 CET4455011846.96.102.1192.168.2.9
                                      Jan 15, 2025 20:00:11.445441961 CET50118445192.168.2.946.96.102.1
                                      Jan 15, 2025 20:00:11.445523024 CET50118445192.168.2.946.96.102.1
                                      Jan 15, 2025 20:00:11.445643902 CET50118445192.168.2.946.96.102.1
                                      Jan 15, 2025 20:00:11.450380087 CET4455011846.96.102.1192.168.2.9
                                      Jan 15, 2025 20:00:11.450470924 CET4455011846.96.102.1192.168.2.9
                                      Jan 15, 2025 20:00:12.789778948 CET4455011988.10.108.1192.168.2.9
                                      Jan 15, 2025 20:00:12.789897919 CET50119445192.168.2.988.10.108.1
                                      Jan 15, 2025 20:00:13.846463919 CET50131445192.168.2.942.230.216.2
                                      Jan 15, 2025 20:00:13.846498966 CET50205445192.168.2.9160.106.135.2
                                      Jan 15, 2025 20:00:13.846524000 CET50142445192.168.2.9188.75.188.2
                                      Jan 15, 2025 20:00:13.846549034 CET50172445192.168.2.910.200.100.2
                                      Jan 15, 2025 20:00:13.846589088 CET50153445192.168.2.979.172.32.2
                                      Jan 15, 2025 20:00:13.846605062 CET50119445192.168.2.988.10.108.1
                                      Jan 15, 2025 20:00:13.846652031 CET50189445192.168.2.9164.135.40.2
                                      Jan 15, 2025 20:00:13.846802950 CET50129445192.168.2.940.72.68.1
                                      Jan 15, 2025 20:00:13.846848965 CET50135445192.168.2.9208.156.168.1
                                      Jan 15, 2025 20:00:13.846873045 CET50140445192.168.2.982.250.219.1
                                      Jan 15, 2025 20:00:13.846885920 CET50126445192.168.2.9107.43.37.1
                                      Jan 15, 2025 20:00:13.846885920 CET50125445192.168.2.9146.226.127.1
                                      Jan 15, 2025 20:00:13.846885920 CET50134445192.168.2.9191.133.120.1
                                      Jan 15, 2025 20:00:13.846901894 CET50147445192.168.2.927.16.134.1
                                      Jan 15, 2025 20:00:13.846940041 CET50148445192.168.2.9106.99.254.1
                                      Jan 15, 2025 20:00:13.846949100 CET50151445192.168.2.9119.254.172.1
                                      Jan 15, 2025 20:00:13.846970081 CET50156445192.168.2.917.137.98.1
                                      Jan 15, 2025 20:00:13.846987009 CET50157445192.168.2.9165.49.37.1
                                      Jan 15, 2025 20:00:13.847009897 CET50160445192.168.2.9201.41.62.1
                                      Jan 15, 2025 20:00:13.847040892 CET50162445192.168.2.9188.195.139.2
                                      Jan 15, 2025 20:00:13.847064972 CET50165445192.168.2.9143.249.87.1
                                      Jan 15, 2025 20:00:13.847084045 CET50166445192.168.2.971.134.184.1
                                      Jan 15, 2025 20:00:13.847148895 CET50175445192.168.2.9185.184.157.3
                                      Jan 15, 2025 20:00:13.847172976 CET50191445192.168.2.9215.248.16.1
                                      Jan 15, 2025 20:00:13.847207069 CET50216445192.168.2.916.102.172.1
                                      Jan 15, 2025 20:00:13.847242117 CET50251445192.168.2.974.8.58.1
                                      Jan 15, 2025 20:00:13.847263098 CET50236445192.168.2.936.17.33.2
                                      Jan 15, 2025 20:00:13.847321987 CET50260445192.168.2.967.221.200.2
                                      Jan 15, 2025 20:00:13.847374916 CET50293445192.168.2.952.2.231.2
                                      Jan 15, 2025 20:00:13.847415924 CET50307445192.168.2.9153.98.17.1
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 15, 2025 19:59:05.511683941 CET5331353192.168.2.91.1.1.1
                                      Jan 15, 2025 19:59:05.818049908 CET53533131.1.1.1192.168.2.9
                                      Jan 15, 2025 19:59:06.551140070 CET5418353192.168.2.91.1.1.1
                                      Jan 15, 2025 19:59:06.879981041 CET53541831.1.1.1192.168.2.9
                                      Jan 15, 2025 19:59:54.522543907 CET138138192.168.2.9192.168.2.255
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 15, 2025 19:59:05.511683941 CET192.168.2.91.1.1.10x5daeStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                      Jan 15, 2025 19:59:06.551140070 CET192.168.2.91.1.1.10x427fStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 15, 2025 19:58:58.354948044 CET1.1.1.1192.168.2.90xb436No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                      Jan 15, 2025 19:58:58.354948044 CET1.1.1.1192.168.2.90xb436No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                      Jan 15, 2025 19:59:05.818049908 CET1.1.1.1192.168.2.90x5daeNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                      Jan 15, 2025 19:59:06.879981041 CET1.1.1.1192.168.2.90x427fNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                      Jan 15, 2025 19:59:06.879981041 CET1.1.1.1192.168.2.90x427fNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                      • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.949742103.224.212.215807496C:\Windows\mssecsvc.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 15, 2025 19:59:05.829505920 CET100OUTGET / HTTP/1.1
                                      Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      Cache-Control: no-cache
                                      Jan 15, 2025 19:59:06.541752100 CET365INHTTP/1.1 302 Found
                                      date: Wed, 15 Jan 2025 18:59:06 GMT
                                      server: Apache
                                      set-cookie: __tad=1736967546.4825785; expires=Sat, 13-Jan-2035 18:59:06 GMT; Max-Age=315360000
                                      location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0613-ae2f-1ca90d9c918b
                                      content-length: 2
                                      content-type: text/html; charset=UTF-8
                                      connection: close
                                      Data Raw: 0a 0a
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.949748199.59.243.228807496C:\Windows\mssecsvc.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 15, 2025 19:59:06.886321068 CET169OUTGET /?subid1=20250116-0559-0613-ae2f-1ca90d9c918b HTTP/1.1
                                      Cache-Control: no-cache
                                      Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      Connection: Keep-Alive
                                      Jan 15, 2025 19:59:07.348448038 CET1236INHTTP/1.1 200 OK
                                      date: Wed, 15 Jan 2025 18:59:07 GMT
                                      content-type: text/html; charset=utf-8
                                      content-length: 1262
                                      x-request-id: ad8299c7-89ff-4ec2-bbe2-55e27823d865
                                      cache-control: no-store, max-age=0
                                      accept-ch: sec-ch-prefers-color-scheme
                                      critical-ch: sec-ch-prefers-color-scheme
                                      vary: sec-ch-prefers-color-scheme
                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_da1A+ma67Xj9WK5E3f8NGgTIkfX2RWg78ozIm2XgAMLhogINNhZormku7bTSSNR8OhLR5BNXiUKCPTMy1RMXHw==
                                      set-cookie: parking_session=ad8299c7-89ff-4ec2-bbe2-55e27823d865; expires=Wed, 15 Jan 2025 19:14:07 GMT; path=/
                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 64 61 31 41 2b 6d 61 36 37 58 6a 39 57 4b 35 45 33 66 38 4e 47 67 54 49 6b 66 58 32 52 57 67 37 38 6f 7a 49 6d 32 58 67 41 4d 4c 68 6f 67 49 4e 4e 68 5a 6f 72 6d 6b 75 37 62 54 53 53 4e 52 38 4f 68 4c 52 35 42 4e 58 69 55 4b 43 50 54 4d 79 31 52 4d 58 48 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_da1A+ma67Xj9WK5E3f8NGgTIkfX2RWg78ozIm2XgAMLhogINNhZormku7bTSSNR8OhLR5BNXiUKCPTMy1RMXHw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                      Jan 15, 2025 19:59:07.348469019 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                      Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYWQ4Mjk5YzctODlmZi00ZWMyLWJiZTItNTVlMjc4MjNkODY1IiwicGFnZV90aW1lIjoxNzM2OTY3NTQ3LCJwYWdlX3VybCI6I


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.949753103.224.212.215807604C:\Windows\mssecsvc.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 15, 2025 19:59:07.734153032 CET100OUTGET / HTTP/1.1
                                      Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      Cache-Control: no-cache
                                      Jan 15, 2025 19:59:08.329915047 CET365INHTTP/1.1 302 Found
                                      date: Wed, 15 Jan 2025 18:59:08 GMT
                                      server: Apache
                                      set-cookie: __tad=1736967548.3746821; expires=Sat, 13-Jan-2035 18:59:08 GMT; Max-Age=315360000
                                      location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-089c-93ee-f812d32354a7
                                      content-length: 2
                                      content-type: text/html; charset=UTF-8
                                      connection: close
                                      Data Raw: 0a 0a
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.949757199.59.243.228807604C:\Windows\mssecsvc.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 15, 2025 19:59:08.533899069 CET169OUTGET /?subid1=20250116-0559-089c-93ee-f812d32354a7 HTTP/1.1
                                      Cache-Control: no-cache
                                      Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      Connection: Keep-Alive
                                      Jan 15, 2025 19:59:08.848803997 CET1236INHTTP/1.1 200 OK
                                      date: Wed, 15 Jan 2025 18:59:08 GMT
                                      content-type: text/html; charset=utf-8
                                      content-length: 1262
                                      x-request-id: 5a886b5f-df32-4c0d-8529-0bc4e30c0328
                                      cache-control: no-store, max-age=0
                                      accept-ch: sec-ch-prefers-color-scheme
                                      critical-ch: sec-ch-prefers-color-scheme
                                      vary: sec-ch-prefers-color-scheme
                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_eE+YotMpW0uOJrMIQiPYzr9b3N71HbmILavyieFAsmouoFGroCZ+HY0ysRtFud0nx77plXhrhA11jaRTqdSAQw==
                                      set-cookie: parking_session=5a886b5f-df32-4c0d-8529-0bc4e30c0328; expires=Wed, 15 Jan 2025 19:14:08 GMT; path=/
                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 65 45 2b 59 6f 74 4d 70 57 30 75 4f 4a 72 4d 49 51 69 50 59 7a 72 39 62 33 4e 37 31 48 62 6d 49 4c 61 76 79 69 65 46 41 73 6d 6f 75 6f 46 47 72 6f 43 5a 2b 48 59 30 79 73 52 74 46 75 64 30 6e 78 37 37 70 6c 58 68 72 68 41 31 31 6a 61 52 54 71 64 53 41 51 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_eE+YotMpW0uOJrMIQiPYzr9b3N71HbmILavyieFAsmouoFGroCZ+HY0ysRtFud0nx77plXhrhA11jaRTqdSAQw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                      Jan 15, 2025 19:59:08.848819971 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                      Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNWE4ODZiNWYtZGYzMi00YzBkLTg1MjktMGJjNGUzMGMwMzI4IiwicGFnZV90aW1lIjoxNzM2OTY3NTQ4LCJwYWdlX3VybCI6I


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.949758103.224.212.215807632C:\Windows\mssecsvc.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 15, 2025 19:59:08.594605923 CET134OUTGET / HTTP/1.1
                                      Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      Cache-Control: no-cache
                                      Cookie: __tad=1736967546.4825785
                                      Jan 15, 2025 19:59:09.044250965 CET269INHTTP/1.1 302 Found
                                      date: Wed, 15 Jan 2025 18:59:08 GMT
                                      server: Apache
                                      location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0559-0897-b8cc-09a3c53062af
                                      content-length: 2
                                      content-type: text/html; charset=UTF-8
                                      connection: close
                                      Data Raw: 0a 0a
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.949769199.59.243.228807632C:\Windows\mssecsvc.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 15, 2025 19:59:09.053673029 CET231OUTGET /?subid1=20250116-0559-0897-b8cc-09a3c53062af HTTP/1.1
                                      Cache-Control: no-cache
                                      Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      Connection: Keep-Alive
                                      Cookie: parking_session=ad8299c7-89ff-4ec2-bbe2-55e27823d865
                                      Jan 15, 2025 19:59:09.519624949 CET1236INHTTP/1.1 200 OK
                                      date: Wed, 15 Jan 2025 18:59:08 GMT
                                      content-type: text/html; charset=utf-8
                                      content-length: 1262
                                      x-request-id: 1ae13674-f1ef-4131-894b-558b54853eaf
                                      cache-control: no-store, max-age=0
                                      accept-ch: sec-ch-prefers-color-scheme
                                      critical-ch: sec-ch-prefers-color-scheme
                                      vary: sec-ch-prefers-color-scheme
                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_DBAf2zU7lyRjCOZV5922B/VPKRJtdt6Mu+3Q4R2qIrvyJEkoDYnrTqnNQgRJV5bXMqFcMEEsW25s0rAOXjG2Ew==
                                      set-cookie: parking_session=ad8299c7-89ff-4ec2-bbe2-55e27823d865; expires=Wed, 15 Jan 2025 19:14:09 GMT
                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 44 42 41 66 32 7a 55 37 6c 79 52 6a 43 4f 5a 56 35 39 32 32 42 2f 56 50 4b 52 4a 74 64 74 36 4d 75 2b 33 51 34 52 32 71 49 72 76 79 4a 45 6b 6f 44 59 6e 72 54 71 6e 4e 51 67 52 4a 56 35 62 58 4d 71 46 63 4d 45 45 73 57 32 35 73 30 72 41 4f 58 6a 47 32 45 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_DBAf2zU7lyRjCOZV5922B/VPKRJtdt6Mu+3Q4R2qIrvyJEkoDYnrTqnNQgRJV5bXMqFcMEEsW25s0rAOXjG2Ew==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                      Jan 15, 2025 19:59:09.519670963 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                      Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYWQ4Mjk5YzctODlmZi00ZWMyLWJiZTItNTVlMjc4MjNkODY1IiwicGFnZV90aW1lIjoxNzM2OTY3NTQ5LCJwYWdlX3VybCI6Imh0dHA6L


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:13:59:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\loaddll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:loaddll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll"
                                      Imagebase:0x940000
                                      File size:126'464 bytes
                                      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:1
                                      Start time:13:59:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff70f010000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:13:59:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1
                                      Imagebase:0xc50000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:13:59:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32.exe C:\Users\user\Desktop\1U9rHEz9Rg.dll,PlayGame
                                      Imagebase:0x720000
                                      File size:61'440 bytes
                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:13:59:03
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",#1
                                      Imagebase:0x720000
                                      File size:61'440 bytes
                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:13:59:04
                                      Start date:15/01/2025
                                      Path:C:\Windows\mssecsvc.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\mssecsvc.exe
                                      Imagebase:0x400000
                                      File size:3'723'264 bytes
                                      MD5 hash:1DA4AA17D6682E2224513E559E86D658
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1365666506.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1365853075.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1365853075.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\mssecsvc.exe, Author: Joe Security
                                      • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (with the help of binar.ly)
                                      • Rule: WannaCry_Ransomware_Gen, Description: Detects WannaCry Ransomware, Source: C:\Windows\mssecsvc.exe, Author: Florian Roth (based on rule by US CERT)
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\mssecsvc.exe, Author: us-cert code analysis team
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 93%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:8
                                      Start time:13:59:06
                                      Start date:15/01/2025
                                      Path:C:\Windows\mssecsvc.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\mssecsvc.exe -m security
                                      Imagebase:0x400000
                                      File size:3'723'264 bytes
                                      MD5 hash:1DA4AA17D6682E2224513E559E86D658
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1392320862.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1392456132.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.1392456132.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2047532566.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2047532566.00000000023E9000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2047163125.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2047163125.0000000001EB7000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                      Reputation:low
                                      Has exited:true

                                      Target ID:9
                                      Start time:13:59:06
                                      Start date:15/01/2025
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32.exe "C:\Users\user\Desktop\1U9rHEz9Rg.dll",PlayGame
                                      Imagebase:0x720000
                                      File size:61'440 bytes
                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:13:59:07
                                      Start date:15/01/2025
                                      Path:C:\Windows\mssecsvc.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\WINDOWS\mssecsvc.exe
                                      Imagebase:0x400000
                                      File size:3'723'264 bytes
                                      MD5 hash:1DA4AA17D6682E2224513E559E86D658
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.1395551943.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.1414303371.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.1395912911.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.1395912911.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.1414468681.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                      • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.1414468681.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                      Reputation:low
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:71.8%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:64.9%
                                        Total number of Nodes:37
                                        Total number of Limit Nodes:9

                                        Callgraph

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                        • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                        • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                        • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                        • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                        • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                        • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                        • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                        • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                        • sprintf.MSVCRT ref: 00407E01
                                        • sprintf.MSVCRT ref: 00407E18
                                        • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                        • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                        • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                        • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                        • CreateProcessA.KERNELBASE ref: 00407EE8
                                        • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                        • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1407869249.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000006.00000002.1407846952.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407892741.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407967402.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                        • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                        • API String ID: 4281112323-1507730452
                                        • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                        • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1407869249.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000006.00000002.1407846952.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407892741.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407967402.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                        • String ID:
                                        • API String ID: 801014965-0
                                        • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                        • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                        Control-flow Graph

                                        APIs
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                        • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                        • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                          • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                        Strings
                                        • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1407869249.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000006.00000002.1407846952.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407892741.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407967402.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                        • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        • API String ID: 774561529-2614457033
                                        • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                        • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                        • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                        • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                        Control-flow Graph

                                        APIs
                                        • sprintf.MSVCRT ref: 00407C56
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                        • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                        • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1407869249.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000006.00000002.1407846952.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407892741.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407967402.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                        • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                        • API String ID: 3340711343-2450984573
                                        • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                        • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                        Control-flow Graph

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • __p___argc.MSVCRT ref: 004080A5
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                        • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                        • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                        • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1407869249.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000006.00000002.1407846952.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407892741.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407913209.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1407967402.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000006.00000002.1408066147.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                        • String ID: mssecsvc2.1
                                        • API String ID: 4274534310-2839763450
                                        • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                        • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                        Execution Graph

                                        Execution Coverage:34.9%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:0%
                                        Total number of Nodes:35
                                        Total number of Limit Nodes:2

                                        Callgraph

                                        Control-flow Graph

                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • __p___argc.MSVCRT ref: 004080A5
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                        • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                        • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                        • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.2046098263.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.2046079670.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046116501.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046201748.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046225612.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                        • String ID: mssecsvc2.1
                                        • API String ID: 4274534310-2839763450
                                        • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                        • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                        • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                        Control-flow Graph

                                        APIs
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                        • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                        • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                          • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                          • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                        Strings
                                        • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.2046098263.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.2046079670.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046116501.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046201748.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046225612.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                        • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                        • API String ID: 774561529-2614457033
                                        • Opcode ID: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                        • Instruction ID: cdf7c9b464921ed547f6e9cf97b0948ff8b518ee0850ecae1f57fc3afa3cefd0
                                        • Opcode Fuzzy Hash: 4b6db363f3c2a0039692f7716f941ccdaf41bdcfad687f466c5e8bce3354d2d7
                                        • Instruction Fuzzy Hash: D20186719543106EE310DF348C05B6BBBE9EF85710F01082EF984F7280E6B59804876B

                                        Control-flow Graph

                                        APIs
                                        • sprintf.MSVCRT ref: 00407C56
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                        • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                        • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.2046098263.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.2046079670.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046116501.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046201748.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046225612.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                        • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                        • API String ID: 3340711343-2450984573
                                        • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                        • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                        • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 14 407ce0-407cfb GetModuleHandleW 15 407d01-407d43 GetProcAddress * 4 14->15 16 407f08-407f14 14->16 15->16 17 407d49-407d4f 15->17 17->16 18 407d55-407d5b 17->18 18->16 19 407d61-407d63 18->19 19->16 20 407d69-407d7e FindResourceA 19->20 20->16 21 407d84-407d8e LoadResource 20->21 21->16 22 407d94-407da1 LockResource 21->22 22->16 23 407da7-407db3 SizeofResource 22->23 23->16 24 407db9-407e4e sprintf * 2 MoveFileExA 23->24 24->16 26 407e54-407ef0 24->26 26->16 30 407ef2-407f01 26->30 30->16
                                        APIs
                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                        • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                        • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                        • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                        • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                        • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                        • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                        • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                        • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                        • sprintf.MSVCRT ref: 00407E01
                                        • sprintf.MSVCRT ref: 00407E18
                                        • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.2046098263.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.2046079670.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046116501.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046201748.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046225612.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                        • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                        • API String ID: 4072214828-1507730452
                                        • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                        • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                        • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.2046098263.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000008.00000002.2046079670.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046116501.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046134499.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046183269.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046201748.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046225612.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 00000008.00000002.2046317656.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_400000_mssecsvc.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                        • String ID:
                                        • API String ID: 801014965-0
                                        • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                        • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                        • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59