Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f5mfkHLLVe.dll

Overview

General Information

Sample name:f5mfkHLLVe.dll
renamed because original name is a hash value
Original sample name:f4467cf9b7f5c536f0766ac2851b53b7.dll
Analysis ID:1592051
MD5:f4467cf9b7f5c536f0766ac2851b53b7
SHA1:5c64d92015518d307b5e5856bc4e4ced71a08c2b
SHA256:89f0d1195df4ff42f0d0ff7726474b2ad6a135cbc78f255ff89b19903459bc67
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Connects to several IPs in different countries
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2084 cmdline: loaddll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6508 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 1656 cmdline: rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvr.exe (PID: 5772 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 835246CD3690184218773906A49D8328)
    • rundll32.exe (PID: 6540 cmdline: rundll32.exe C:\Users\user\Desktop\f5mfkHLLVe.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1948 cmdline: rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 5916 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 835246CD3690184218773906A49D8328)
  • mssecsvr.exe (PID: 3196 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: 835246CD3690184218773906A49D8328)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
f5mfkHLLVe.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    f5mfkHLLVe.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    f5mfkHLLVe.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      SourceRuleDescriptionAuthorStrings
      00000008.00000000.2185223099.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000000.2160946796.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000A.00000000.2189366681.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                Click to see the 20 entries
                SourceRuleDescriptionAuthorStrings
                8.2.mssecsvr.exe.1d4c084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                8.2.mssecsvr.exe.22748c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                8.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xe8d8:$x3: tasksche.exe
                • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xe92c:$x5: WNcry@2ol7
                • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xe82c:$s3: cmd.exe /c "%s"
                8.0.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                8.2.mssecsvr.exe.1d7e128.5.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xe8d8:$x3: tasksche.exe
                • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xe92c:$x5: WNcry@2ol7
                • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xe82c:$s3: cmd.exe /c "%s"
                Click to see the 87 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T17:47:15.943539+010028033043Unknown Traffic192.168.2.649710103.224.212.21580TCP
                2025-01-15T17:47:17.538441+010028033043Unknown Traffic192.168.2.649712103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T17:47:15.024089+010028300181A Network Trojan was detected192.168.2.6539991.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: f5mfkHLLVe.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b827fAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc12Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488c58Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488cAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b82Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/%Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fcAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/eAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwAvira URL Cloud: Label: malware
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 96%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 96%
                Source: f5mfkHLLVe.dllVirustotal: Detection: 94%Perma Link
                Source: f5mfkHLLVe.dllReversingLabs: Detection: 92%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: f5mfkHLLVe.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: f5mfkHLLVe.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49910 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49782 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50020 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50263 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50640 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50642 version: TLS 1.2

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.6:53999 -> 1.1.1.1:53
                Source: unknownNetwork traffic detected: IP country count 11
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0347-1541-9f57-da56839b827f HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736959635.6911048
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc12 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0347-17ae-b188-3b0abf488c58 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=ebac6318-2a75-4752-ba46-19550119d49c
                Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49712 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49710 -> 103.224.212.215:80
                Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49910 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.212
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.212
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.212
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.1
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.212
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.1
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.1
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.1
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.1
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.1
                Source: unknownTCP traffic detected without corresponding DNS query: 16.50.237.1
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.7
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.7
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.7
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.1
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.7
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.1
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.1
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.1
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.1
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.1
                Source: unknownTCP traffic detected without corresponding DNS query: 19.64.25.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.163
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.163
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.163
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.1
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.163
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.60.133.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0347-1541-9f57-da56839b827f HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736959635.6911048
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc12 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0347-17ae-b188-3b0abf488c58 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=ebac6318-2a75-4752-ba46-19550119d49c
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000006.00000002.2198166396.0000000000A7D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/%
                Source: mssecsvr.exe, 00000006.00000002.2198166396.0000000000A46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw
                Source: mssecsvr.exe, 00000006.00000002.2198166396.0000000000A60000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2198166396.0000000000A7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b82
                Source: mssecsvr.exe, 00000008.00000003.2197367859.0000000000B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc
                Source: mssecsvr.exe, 0000000A.00000002.2205984720.0000000000ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488c
                Source: mssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/e
                Source: f5mfkHLLVe.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000006.00000002.2198166396.0000000000A46000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2198166396.0000000000A60000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2205984720.0000000000ACF000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2205984720.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 0000000A.00000002.2205984720.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwer
                Source: mssecsvr.exe, 00000006.00000002.2198166396.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/P
                Source: mssecsvr.exe, 0000000A.00000002.2205984720.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/t
                Source: mssecsvr.exe, 0000000A.00000002.2205984720.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com5
                Source: mssecsvr.exe, 00000008.00000002.2832646077.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50263
                Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50640
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50642
                Source: unknownNetwork traffic detected: HTTP traffic on port 50263 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 50640 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49910
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49782 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50020 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50263 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50640 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50642 version: TLS 1.2

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: f5mfkHLLVe.dll, type: SAMPLE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d7e128.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22a696c.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5b104.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2283948.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d4c084.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22748c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5b104.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.227f8e8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d570a4.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2283948.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000000.2185223099.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2160946796.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.2189366681.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2205428809.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.2185353936.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2205701393.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2834191823.0000000002283000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2833962615.0000000001D5B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.2189507796.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2161097186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 5772, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 3196, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 5916, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                System Summary

                barindex
                Source: f5mfkHLLVe.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: f5mfkHLLVe.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d4c084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22748c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d7e128.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d7e128.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22a696c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22a696c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d7e128.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d7e128.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22a696c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22a696c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d5b104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d5b104.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.1d5b104.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.2283948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2283948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.2283948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d4c084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d4c084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22748c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22748c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d5b104.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d5b104.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.227f8e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.227f8e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d570a4.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d570a4.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.2283948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2283948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.2185353936.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000002.2205701393.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2834191823.0000000002283000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2833962615.0000000001D5B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000000.2189507796.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.2161097186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: tasksche.exe.6.drStatic PE information: No import functions for PE file found
                Source: f5mfkHLLVe.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: f5mfkHLLVe.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: f5mfkHLLVe.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d4c084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22748c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d7e128.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d7e128.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22a696c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22a696c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d7e128.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d7e128.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22a696c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22a696c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d5b104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d5b104.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.1d5b104.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.2283948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2283948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.2283948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d4c084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d4c084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22748c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22748c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d5b104.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d5b104.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.227f8e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.227f8e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d570a4.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d570a4.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.2283948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2283948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.2185353936.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000002.2205701393.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2834191823.0000000002283000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2833962615.0000000001D5B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000000.2189507796.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.2161097186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: tasksche.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: tasksche.exe.6.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                Source: tasksche.exe.6.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                Source: tasksche.exe.6.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                Source: f5mfkHLLVe.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3768:120:WilError_03
                Source: f5mfkHLLVe.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\f5mfkHLLVe.dll,PlayGame
                Source: f5mfkHLLVe.dllVirustotal: Detection: 94%
                Source: f5mfkHLLVe.dllReversingLabs: Detection: 92%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\f5mfkHLLVe.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\f5mfkHLLVe.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: f5mfkHLLVe.dllStatic file information: File size 5267459 > 1048576
                Source: f5mfkHLLVe.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: tasksche.exe.6.drStatic PE information: section name: .text entropy: 7.64063717569669

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exe TID: 3360Thread sleep count: 93 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 3360Thread sleep time: -186000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 4620Thread sleep count: 125 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 4620Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 3360Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvr.exe, 00000006.00000003.2176271509.0000000000A80000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2198166396.0000000000A7D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2197367859.0000000000BAF000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2833159917.0000000000BAF000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2205984720.0000000000AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvr.exe, 00000006.00000002.2198166396.0000000000A46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp7
                Source: mssecsvr.exe, 0000000A.00000002.2205984720.0000000000ABE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1Jump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592051 Sample: f5mfkHLLVe.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 36 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->38 40 77026.bodis.com 2->40 48 Suricata IDS alerts for network traffic 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for URL or domain 2->52 54 7 other signatures 2->54 9 loaddll32.exe 1 2->9         started        11 mssecsvr.exe 12 2->11         started        signatures3 process4 dnsIp5 15 rundll32.exe 9->15         started        18 cmd.exe 1 9->18         started        20 conhost.exe 9->20         started        22 rundll32.exe 1 9->22         started        42 192.168.2.102 unknown unknown 11->42 44 192.168.2.103 unknown unknown 11->44 46 98 other IPs or domains 11->46 56 Connects to many different private IPs via SMB (likely to spread or exploit) 11->56 58 Connects to many different private IPs (likely to spread or exploit) 11->58 signatures6 process7 signatures8 60 Drops executables to the windows directory (C:\Windows) and starts them 15->60 24 mssecsvr.exe 13 15->24         started        27 rundll32.exe 18->27         started        process9 file10 32 C:\WINDOWS\qeriuwjhrf (copy), PE32 24->32 dropped 29 mssecsvr.exe 13 27->29         started        process11 file12 34 C:\Windows\tasksche.exe, PE32 29->34 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                f5mfkHLLVe.dll94%VirustotalBrowse
                f5mfkHLLVe.dll92%ReversingLabsWin32.Ransomware.WannaCry
                f5mfkHLLVe.dll100%AviraTR/AD.WannaCry.zlvlj
                f5mfkHLLVe.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)96%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe96%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b827f100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc12100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488c58100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488c100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b82100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/%100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/e100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrw100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com50%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    high
                    ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488c58false
                      • Avira URL Cloud: malware
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                        high
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc12false
                        • Avira URL Cloud: malware
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b827ffalse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com5mssecsvr.exe, 0000000A.00000002.2205984720.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000006.00000002.2198166396.0000000000A7D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comf5mfkHLLVe.dllfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488cmssecsvr.exe, 0000000A.00000002.2205984720.0000000000ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b82mssecsvr.exe, 00000006.00000002.2198166396.0000000000A60000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.2198166396.0000000000A7D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000008.00000002.2832646077.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                              high
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/%mssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/emssecsvr.exe, 00000008.00000002.2833159917.0000000000B68000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/22www.iuqerfsodp9ifjaposdfjhgosurijfaewrwermssecsvr.exe, 0000000A.00000002.2205984720.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/tmssecsvr.exe, 0000000A.00000002.2205984720.0000000000A98000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fcmssecsvr.exe, 00000008.00000003.2197367859.0000000000B9F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Pmssecsvr.exe, 00000006.00000002.2198166396.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/33ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwmssecsvr.exe, 00000006.00000002.2198166396.0000000000A46000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    152.164.46.1
                                    unknownUnited States
                                    701UUNETUSfalse
                                    182.30.213.111
                                    unknownIndonesia
                                    4795INDOSATM2-IDINDOSATM2ASNIDfalse
                                    219.105.215.1
                                    unknownJapan4704SANNETRakutenMobileIncJPfalse
                                    154.92.211.86
                                    unknownSeychelles
                                    22769DDOSING-BGP-NETWORKUSfalse
                                    143.125.156.228
                                    unknownJapan2497IIJInternetInitiativeJapanIncJPfalse
                                    219.105.215.2
                                    unknownJapan4704SANNETRakutenMobileIncJPfalse
                                    16.50.237.212
                                    unknownUnited States
                                    unknownunknownfalse
                                    20.66.242.32
                                    unknownUnited States
                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                    79.11.33.150
                                    unknownItaly
                                    3269ASN-IBSNAZITfalse
                                    206.65.90.1
                                    unknownUnited States
                                    701UUNETUSfalse
                                    145.229.6.225
                                    unknownUnited Kingdom
                                    33873ARVATO-SYSTEMS-ASDEfalse
                                    35.145.151.140
                                    unknownUnited States
                                    394141ROCKET-FIBERUSfalse
                                    143.125.156.1
                                    unknownJapan2497IIJInternetInitiativeJapanIncJPfalse
                                    195.128.239.243
                                    unknownUnited Kingdom
                                    24916ORBITAL-ASNCountyHouseStationApproachGBfalse
                                    191.230.113.27
                                    unknownBrazil
                                    26615TIMSABRfalse
                                    146.245.78.167
                                    unknownUnited States
                                    31822CITY-UNIVERSITY-OF-NEW-YORKUSfalse
                                    206.65.90.206
                                    unknownUnited States
                                    701UUNETUSfalse
                                    95.128.26.42
                                    unknownDenmark
                                    198455I2-HOSTINGDKfalse
                                    219.105.215.211
                                    unknownJapan4704SANNETRakutenMobileIncJPfalse
                                    202.206.173.165
                                    unknownChina
                                    4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
                                    105.213.27.1
                                    unknownSouth Africa
                                    16637MTNNS-ASZAfalse
                                    76.104.214.135
                                    unknownUnited States
                                    7922COMCAST-7922USfalse
                                    IP
                                    192.168.2.148
                                    192.168.2.149
                                    192.168.2.146
                                    192.168.2.147
                                    192.168.2.140
                                    192.168.2.141
                                    192.168.2.144
                                    192.168.2.145
                                    192.168.2.142
                                    192.168.2.143
                                    192.168.2.159
                                    192.168.2.157
                                    192.168.2.158
                                    192.168.2.151
                                    192.168.2.152
                                    192.168.2.150
                                    192.168.2.155
                                    192.168.2.156
                                    192.168.2.153
                                    192.168.2.154
                                    192.168.2.126
                                    192.168.2.247
                                    192.168.2.127
                                    192.168.2.248
                                    192.168.2.124
                                    192.168.2.245
                                    192.168.2.125
                                    192.168.2.246
                                    192.168.2.128
                                    192.168.2.249
                                    192.168.2.129
                                    192.168.2.240
                                    192.168.2.122
                                    192.168.2.243
                                    192.168.2.123
                                    192.168.2.244
                                    192.168.2.120
                                    192.168.2.241
                                    192.168.2.121
                                    192.168.2.242
                                    192.168.2.97
                                    192.168.2.137
                                    192.168.2.96
                                    192.168.2.138
                                    192.168.2.99
                                    192.168.2.135
                                    192.168.2.98
                                    192.168.2.136
                                    192.168.2.139
                                    192.168.2.250
                                    192.168.2.130
                                    192.168.2.251
                                    192.168.2.91
                                    192.168.2.90
                                    192.168.2.93
                                    192.168.2.133
                                    192.168.2.254
                                    192.168.2.92
                                    192.168.2.134
                                    192.168.2.95
                                    192.168.2.131
                                    192.168.2.252
                                    192.168.2.94
                                    192.168.2.132
                                    192.168.2.253
                                    192.168.2.104
                                    192.168.2.225
                                    192.168.2.105
                                    192.168.2.226
                                    192.168.2.102
                                    192.168.2.223
                                    192.168.2.103
                                    192.168.2.224
                                    192.168.2.108
                                    192.168.2.229
                                    192.168.2.109
                                    192.168.2.106
                                    192.168.2.227
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1592051
                                    Start date and time:2025-01-15 17:46:10 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 24s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:15
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:f5mfkHLLVe.dll
                                    renamed because original name is a hash value
                                    Original Sample Name:f4467cf9b7f5c536f0766ac2851b53b7.dll
                                    Detection:MAL
                                    Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .dll
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                    • Excluded IPs from analysis (whitelisted): 2.17.190.73, 2.22.50.131, 199.232.214.172, 13.107.246.45, 20.12.23.50
                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    11:47:16API Interceptor1x Sleep call for process: loaddll32.exe modified
                                    11:47:51API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    77026.bodis.comq4e7rZQEkL.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    Gn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                    • 199.59.243.228
                                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comq4e7rZQEkL.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    Gn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    F1G5BkUV74.dllGet hashmaliciousWannacryBrowse
                                    • 103.224.212.215
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    SANNETRakutenMobileIncJPbot.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 157.220.202.165
                                    i686.elfGet hashmaliciousMiraiBrowse
                                    • 157.215.70.22
                                    i486.elfGet hashmaliciousMiraiBrowse
                                    • 157.214.20.146
                                    m68k.elfGet hashmaliciousMiraiBrowse
                                    • 157.219.93.165
                                    xd.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 202.216.21.255
                                    sh4.elfGet hashmaliciousMiraiBrowse
                                    • 157.194.40.21
                                    spc.elfGet hashmaliciousMiraiBrowse
                                    • 157.222.253.23
                                    ppc.elfGet hashmaliciousMiraiBrowse
                                    • 157.215.239.57
                                    mips.elfGet hashmaliciousMiraiBrowse
                                    • 157.215.70.26
                                    meth8.elfGet hashmaliciousMiraiBrowse
                                    • 157.222.228.58
                                    UUNETUSbot.x86.elfGet hashmaliciousUnknownBrowse
                                    • 173.70.19.67
                                    bot.arm5.elfGet hashmaliciousUnknownBrowse
                                    • 72.73.7.152
                                    bot.m68k.elfGet hashmaliciousUnknownBrowse
                                    • 203.102.176.156
                                    bot.sh4.elfGet hashmaliciousUnknownBrowse
                                    • 96.255.184.180
                                    bot.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 193.130.206.250
                                    bot.ppc.elfGet hashmaliciousUnknownBrowse
                                    • 63.21.192.94
                                    i686.elfGet hashmaliciousMiraiBrowse
                                    • 71.183.254.80
                                    arm5.elfGet hashmaliciousMiraiBrowse
                                    • 194.178.167.26
                                    m68k.elfGet hashmaliciousMiraiBrowse
                                    • 152.192.207.194
                                    xd.arm.elfGet hashmaliciousMiraiBrowse
                                    • 146.188.154.125
                                    INDOSATM2-IDINDOSATM2ASNIDbot.arm5.elfGet hashmaliciousUnknownBrowse
                                    • 182.24.76.170
                                    spc.elfGet hashmaliciousUnknownBrowse
                                    • 182.27.1.176
                                    meth14.elfGet hashmaliciousMiraiBrowse
                                    • 124.81.164.56
                                    sora.mips.elfGet hashmaliciousUnknownBrowse
                                    • 114.56.64.156
                                    sora.ppc.elfGet hashmaliciousUnknownBrowse
                                    • 182.28.200.241
                                    Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                                    • 219.83.157.198
                                    4.elfGet hashmaliciousUnknownBrowse
                                    • 124.81.4.59
                                    db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                    • 182.28.194.84
                                    xd.sh4.elfGet hashmaliciousMiraiBrowse
                                    • 114.58.228.10
                                    loligang.mips.elfGet hashmaliciousMiraiBrowse
                                    • 182.24.76.182
                                    DDOSING-BGP-NETWORKUScamp.mips.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    camp.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    camp.arm.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    camp.ppc.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    camp.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    camp.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    camp.x86_64.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    camp.i686.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.11
                                    hikarm4.elfGet hashmaliciousUnknownBrowse
                                    • 154.213.187.125
                                    hikarm7.elfGet hashmaliciousMiraiBrowse
                                    • 154.213.187.125
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    1138de370e523e824bbca92d049a37772lX8Z3eydC.dllGet hashmaliciousWannacryBrowse
                                    • 173.222.162.64
                                    ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                                    • 173.222.162.64
                                    Personliche Nachricht fur e4060738.pdfGet hashmaliciousUnknownBrowse
                                    • 173.222.162.64
                                    https://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSPT0wVekqsfeOZRSaz9d28itE0eTxOetbwlGaCx05rQJywXo_UNbDpVWBvKTmUslwem1E0EC2Cp68hMzvjQfllUT9E4DZqDf2uiRmAk3QSMceJiv-2FShXGXSXiT9Fl37dFQYscKLxEMcTJj4tm5gMav6Ov9aRXzCg4yzvno75Wb80hSd5kw8Ua5r4R2pwCFTS4zDFYiEkWB-2BYk1VUWtpkJwb9IQIMAq1SSLT005wiJ2XiGw1jPEr6v61MJQRnC7AeLVtxYgqGlydBoPFbs1IP04-2BxPajuRI3fTsnzWZ9ty3RasYpwuqdrF0E8VoyYkggeeLEm9ENK69uYTCVHWHpxCPkzirQSIkvpt5FNZojg491ibS35IgO0LPU5gnpEaeaUj4-2BZoFUHIAAzMMy-2BYqsZ9F9Ldu1c-3D#XGet hashmaliciousHTMLPhisherBrowse
                                    • 173.222.162.64
                                    NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                    • 173.222.162.64
                                    330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                    • 173.222.162.64
                                    https://asalto-bart.eu/o/dcvGet hashmaliciousUnknownBrowse
                                    • 173.222.162.64
                                    https://teiegram-mg.org/Get hashmaliciousUnknownBrowse
                                    • 173.222.162.64
                                    https://sreamconmymnltty.com/scerty/bliun/bolopGet hashmaliciousUnknownBrowse
                                    • 173.222.162.64
                                    https://reviewpolicysocialreach.vercel.app/help&z/Get hashmaliciousHTMLPhisherBrowse
                                    • 173.222.162.64
                                    3b5074b1b5d032e5620f69f9f700ff0elummm_lzmb.exeGet hashmaliciousLummaCBrowse
                                    • 40.115.3.253
                                    2lX8Z3eydC.dllGet hashmaliciousWannacryBrowse
                                    • 40.115.3.253
                                    aASfOObWpW.exeGet hashmaliciousUnknownBrowse
                                    • 40.115.3.253
                                    aASfOObWpW.exeGet hashmaliciousUnknownBrowse
                                    • 40.115.3.253
                                    Updater.exeGet hashmaliciousUnknownBrowse
                                    • 40.115.3.253
                                    Updater.exeGet hashmaliciousUnknownBrowse
                                    • 40.115.3.253
                                    Personliche Nachricht fur e4060738.pdfGet hashmaliciousUnknownBrowse
                                    • 40.115.3.253
                                    https://pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev/index.html#watson.becky@aidb.orgGet hashmaliciousHTMLPhisherBrowse
                                    • 40.115.3.253
                                    Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 40.115.3.253
                                    No context
                                    Process:C:\Windows\mssecsvr.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):2061938
                                    Entropy (8bit):5.221684226784344
                                    Encrypted:false
                                    SSDEEP:24576:tihdmMSirYbcMNgef0QeQjG/D8kIqRYo:9MSPbcBVQej/1
                                    MD5:56000F7FC909094342ED67DF0A55DB32
                                    SHA1:D38085AC15E01FE6AE5599DBE52840AE10521E77
                                    SHA-256:5B6516A690ACC5DBDE55832F2D386E868B901A33669458D2FF6CF0499E376299
                                    SHA-512:3461B8F27FCB74A80F095FAAE8CAB5CD530330AA786AB74CBF3CA900A35C96283F25EFC84DE8C8821394F6A31FD139507322BCBFFD0EA60FB11C87605BF6FA59
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 96%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\mssecsvr.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):2061938
                                    Entropy (8bit):5.221684226784344
                                    Encrypted:false
                                    SSDEEP:24576:tihdmMSirYbcMNgef0QeQjG/D8kIqRYo:9MSPbcBVQej/1
                                    MD5:56000F7FC909094342ED67DF0A55DB32
                                    SHA1:D38085AC15E01FE6AE5599DBE52840AE10521E77
                                    SHA-256:5B6516A690ACC5DBDE55832F2D386E868B901A33669458D2FF6CF0499E376299
                                    SHA-512:3461B8F27FCB74A80F095FAAE8CAB5CD530330AA786AB74CBF3CA900A35C96283F25EFC84DE8C8821394F6A31FD139507322BCBFFD0EA60FB11C87605BF6FA59
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                    • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 96%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):2.6683885199664408
                                    TrID:
                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                    • DOS Executable Generic (2002/1) 0.20%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:f5mfkHLLVe.dll
                                    File size:5'267'459 bytes
                                    MD5:f4467cf9b7f5c536f0766ac2851b53b7
                                    SHA1:5c64d92015518d307b5e5856bc4e4ced71a08c2b
                                    SHA256:89f0d1195df4ff42f0d0ff7726474b2ad6a135cbc78f255ff89b19903459bc67
                                    SHA512:3a7bd00462040ed25e29ceef192dfcba74b81811465f5921b0a09deb4b3845e1686ed274ae12568f60ebee6fd9c6dbbc4cfd56a727f944101b1a86a38cc4c4a4
                                    SSDEEP:24576:RbLgurihdmMSirYbcMNgef0QeQjG/D8kIqRYo:RnnMSPbcBVQej/1
                                    TLSH:E536239A75AC51F8C2163770A4778E26E1B73C6D21BA9B0F9B808A321C03B55FB54F53
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                    Icon Hash:7ae282899bbab082
                                    Entrypoint:0x100011e9
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x10000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                    DLL Characteristics:
                                    Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    push ebx
                                    mov ebx, dword ptr [ebp+08h]
                                    push esi
                                    mov esi, dword ptr [ebp+0Ch]
                                    push edi
                                    mov edi, dword ptr [ebp+10h]
                                    test esi, esi
                                    jne 00007EFFB4BBC8BBh
                                    cmp dword ptr [10003140h], 00000000h
                                    jmp 00007EFFB4BBC8D8h
                                    cmp esi, 01h
                                    je 00007EFFB4BBC8B7h
                                    cmp esi, 02h
                                    jne 00007EFFB4BBC8D4h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007EFFB4BBC8BBh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    test eax, eax
                                    je 00007EFFB4BBC8BEh
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007EFFB4BBC7CAh
                                    test eax, eax
                                    jne 00007EFFB4BBC8B6h
                                    xor eax, eax
                                    jmp 00007EFFB4BBC900h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007EFFB4BBC67Ch
                                    cmp esi, 01h
                                    mov dword ptr [ebp+0Ch], eax
                                    jne 00007EFFB4BBC8BEh
                                    test eax, eax
                                    jne 00007EFFB4BBC8E9h
                                    push edi
                                    push eax
                                    push ebx
                                    call 00007EFFB4BBC7A6h
                                    test esi, esi
                                    je 00007EFFB4BBC8B7h
                                    cmp esi, 03h
                                    jne 00007EFFB4BBC8D8h
                                    push edi
                                    push esi
                                    push ebx
                                    call 00007EFFB4BBC795h
                                    test eax, eax
                                    jne 00007EFFB4BBC8B5h
                                    and dword ptr [ebp+0Ch], eax
                                    cmp dword ptr [ebp+0Ch], 00000000h
                                    je 00007EFFB4BBC8C3h
                                    mov eax, dword ptr [10003150h]
                                    test eax, eax
                                    je 00007EFFB4BBC8BAh
                                    push edi
                                    push esi
                                    push ebx
                                    call eax
                                    mov dword ptr [ebp+0Ch], eax
                                    mov eax, dword ptr [ebp+0Ch]
                                    pop edi
                                    pop esi
                                    pop ebx
                                    pop ebp
                                    retn 000Ch
                                    jmp dword ptr [10002028h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    Programming Language:
                                    • [ C ] VS98 (6.0) build 8168
                                    • [C++] VS98 (6.0) build 8168
                                    • [RES] VS98 (6.0) cvtres build 1720
                                    • [LNK] VS98 (6.0) imp/exp build 8168
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x40000x5000600x5010002e32551df713521a98531cf0531dce4bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    W0x40600x500000dataEnglishUnited States0.8791799545288086
                                    DLLImport
                                    KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                    MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                    NameOrdinalAddress
                                    PlayGame10x10001114
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-15T17:47:15.024089+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.6539991.1.1.153UDP
                                    2025-01-15T17:47:15.943539+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649710103.224.212.21580TCP
                                    2025-01-15T17:47:17.538441+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649712103.224.212.21580TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 17:47:07.428479910 CET49673443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:07.428492069 CET49674443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:07.694077969 CET49672443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:14.058662891 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.058702946 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:14.058763981 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.059792042 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.059809923 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:14.867196083 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:14.867273092 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.872313023 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.872328997 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:14.872586012 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:14.874856949 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.874913931 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.874921083 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:14.875102997 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:14.919341087 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:15.046957016 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:15.047066927 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:15.047122955 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:15.047281027 CET49709443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:15.047298908 CET4434970940.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:15.332046986 CET4971080192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:15.336822987 CET8049710103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:15.336910963 CET4971080192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:15.337708950 CET4971080192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:15.342428923 CET8049710103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:15.943342924 CET8049710103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:15.943416119 CET8049710103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:15.943538904 CET4971080192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:15.995251894 CET4971080192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:16.000200987 CET8049710103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:16.332829952 CET4971180192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:16.337594032 CET8049711199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:16.337703943 CET4971180192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:16.337951899 CET4971180192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:16.342654943 CET8049711199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:16.806006908 CET8049711199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:16.806030035 CET8049711199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:16.806421995 CET4971180192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:16.813020945 CET4971180192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:16.813061953 CET4971180192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:16.818443060 CET8049711199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:16.818490028 CET4971180192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:16.940259933 CET4971280192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:16.945296049 CET8049712103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:16.945367098 CET4971280192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:16.945595980 CET4971280192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:16.950396061 CET8049712103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.037786007 CET49673443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:17.037800074 CET49674443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:17.303426981 CET49672443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:17.374969959 CET4971380192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.379797935 CET8049713103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.379899979 CET4971380192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.380068064 CET4971380192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.384830952 CET8049713103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.538379908 CET8049712103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.538440943 CET4971280192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.538535118 CET8049712103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.538592100 CET4971280192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.542749882 CET4971280192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.545241117 CET4971480192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:17.547499895 CET8049712103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.550139904 CET8049714199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:17.550201893 CET4971480192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:17.550451040 CET4971480192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:17.555228949 CET8049714199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:17.990780115 CET8049713103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.990907907 CET4971380192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.990955114 CET8049713103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.991012096 CET4971380192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.993225098 CET4971380192.168.2.6103.224.212.215
                                    Jan 15, 2025 17:47:17.995109081 CET4971580192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:17.998215914 CET8049713103.224.212.215192.168.2.6
                                    Jan 15, 2025 17:47:17.999965906 CET8049715199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:18.000041962 CET4971580192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.000174046 CET4971580192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.004880905 CET8049715199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:18.025686026 CET8049714199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:18.025705099 CET8049714199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:18.025753021 CET4971480192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.025782108 CET4971480192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.031969070 CET4971480192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.032002926 CET4971480192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.065718889 CET49716445192.168.2.616.50.237.212
                                    Jan 15, 2025 17:47:18.070645094 CET4454971616.50.237.212192.168.2.6
                                    Jan 15, 2025 17:47:18.070705891 CET49716445192.168.2.616.50.237.212
                                    Jan 15, 2025 17:47:18.070756912 CET49716445192.168.2.616.50.237.212
                                    Jan 15, 2025 17:47:18.073668957 CET49717445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:18.077326059 CET4454971616.50.237.212192.168.2.6
                                    Jan 15, 2025 17:47:18.077373028 CET49716445192.168.2.616.50.237.212
                                    Jan 15, 2025 17:47:18.078458071 CET4454971716.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:18.078509092 CET49717445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:18.078541994 CET49717445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:18.079761028 CET49718445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:18.084589005 CET4454971816.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:18.084671974 CET49718445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:18.084815979 CET49718445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:18.085035086 CET4454971716.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:18.085081100 CET49717445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:18.089585066 CET4454971816.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:18.495793104 CET8049715199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:18.495830059 CET8049715199.59.243.228192.168.2.6
                                    Jan 15, 2025 17:47:18.495930910 CET4971580192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.560048103 CET4971580192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.560103893 CET4971580192.168.2.6199.59.243.228
                                    Jan 15, 2025 17:47:18.971364021 CET44349705173.222.162.64192.168.2.6
                                    Jan 15, 2025 17:47:18.971514940 CET49705443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:20.070311069 CET49747445192.168.2.619.64.25.7
                                    Jan 15, 2025 17:47:20.075062990 CET4454974719.64.25.7192.168.2.6
                                    Jan 15, 2025 17:47:20.075135946 CET49747445192.168.2.619.64.25.7
                                    Jan 15, 2025 17:47:20.075176001 CET49747445192.168.2.619.64.25.7
                                    Jan 15, 2025 17:47:20.075351954 CET49748445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:20.080173016 CET4454974719.64.25.7192.168.2.6
                                    Jan 15, 2025 17:47:20.080188036 CET4454974819.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:20.080230951 CET49747445192.168.2.619.64.25.7
                                    Jan 15, 2025 17:47:20.080259085 CET49748445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:20.080343962 CET49748445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:20.081557035 CET49749445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:20.085227013 CET4454974819.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:20.086384058 CET4454974919.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:20.086440086 CET49748445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:20.086482048 CET49749445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:20.086528063 CET49749445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:20.091360092 CET4454974919.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:22.086287022 CET49780445192.168.2.623.60.133.163
                                    Jan 15, 2025 17:47:22.091114044 CET4454978023.60.133.163192.168.2.6
                                    Jan 15, 2025 17:47:22.091208935 CET49780445192.168.2.623.60.133.163
                                    Jan 15, 2025 17:47:22.091285944 CET49780445192.168.2.623.60.133.163
                                    Jan 15, 2025 17:47:22.091511965 CET49781445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:22.092536926 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.092576981 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:22.092641115 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.093240023 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.093252897 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:22.096211910 CET4454978023.60.133.163192.168.2.6
                                    Jan 15, 2025 17:47:22.096273899 CET49780445192.168.2.623.60.133.163
                                    Jan 15, 2025 17:47:22.096321106 CET4454978123.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:22.096384048 CET49781445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:22.096441031 CET49781445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:22.097556114 CET49783445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:22.101346970 CET4454978123.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:22.101407051 CET49781445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:22.102365971 CET4454978323.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:22.102432013 CET49783445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:22.102477074 CET49783445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:22.107307911 CET4454978323.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:22.909070969 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:22.909171104 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.911540031 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.911549091 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:22.911791086 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:22.914047003 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.914104939 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.914113998 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:22.914407969 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:22.955327034 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:23.090240955 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:23.090361118 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:23.090907097 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:23.102838039 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:23.102870941 CET4434978240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:23.102907896 CET49782443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:24.102642059 CET49821445192.168.2.6219.105.215.211
                                    Jan 15, 2025 17:47:24.108201027 CET44549821219.105.215.211192.168.2.6
                                    Jan 15, 2025 17:47:24.108311892 CET49821445192.168.2.6219.105.215.211
                                    Jan 15, 2025 17:47:24.108354092 CET49821445192.168.2.6219.105.215.211
                                    Jan 15, 2025 17:47:24.108624935 CET49822445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:24.114541054 CET44549821219.105.215.211192.168.2.6
                                    Jan 15, 2025 17:47:24.114605904 CET49821445192.168.2.6219.105.215.211
                                    Jan 15, 2025 17:47:24.114768028 CET44549822219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:24.114842892 CET49822445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:24.114881992 CET49822445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:24.116183043 CET49823445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:24.121017933 CET44549823219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:24.121103048 CET49823445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:24.121176004 CET49823445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:24.122598886 CET44549822219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:24.122668982 CET49822445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:24.125966072 CET44549823219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:26.117052078 CET49855445192.168.2.6146.131.129.220
                                    Jan 15, 2025 17:47:26.121926069 CET44549855146.131.129.220192.168.2.6
                                    Jan 15, 2025 17:47:26.122029066 CET49855445192.168.2.6146.131.129.220
                                    Jan 15, 2025 17:47:26.122067928 CET49855445192.168.2.6146.131.129.220
                                    Jan 15, 2025 17:47:26.122226954 CET49856445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:26.127130032 CET44549856146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:26.127161980 CET44549855146.131.129.220192.168.2.6
                                    Jan 15, 2025 17:47:26.127202988 CET49856445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:26.127234936 CET49855445192.168.2.6146.131.129.220
                                    Jan 15, 2025 17:47:26.127326012 CET49856445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:26.128365993 CET49857445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:26.132214069 CET44549856146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:26.132276058 CET49856445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:26.133219004 CET44549857146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:26.133290052 CET49857445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:26.133357048 CET49857445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:26.138194084 CET44549857146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:28.134660006 CET49895445192.168.2.620.66.242.32
                                    Jan 15, 2025 17:47:28.139447927 CET4454989520.66.242.32192.168.2.6
                                    Jan 15, 2025 17:47:28.139550924 CET49895445192.168.2.620.66.242.32
                                    Jan 15, 2025 17:47:28.139589071 CET49895445192.168.2.620.66.242.32
                                    Jan 15, 2025 17:47:28.139801025 CET49896445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:28.144512892 CET4454989520.66.242.32192.168.2.6
                                    Jan 15, 2025 17:47:28.144543886 CET4454989620.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:28.144592047 CET49895445192.168.2.620.66.242.32
                                    Jan 15, 2025 17:47:28.144632101 CET49896445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:28.144702911 CET49896445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:28.145739079 CET49897445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:28.149554014 CET4454989620.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:28.149610043 CET49896445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:28.150552034 CET4454989720.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:28.150614977 CET49897445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:28.150696993 CET49897445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:28.155411959 CET4454989720.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:28.672343969 CET49705443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:28.672569036 CET49705443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:28.672864914 CET49910443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:28.672925949 CET44349910173.222.162.64192.168.2.6
                                    Jan 15, 2025 17:47:28.673000097 CET49910443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:28.673326015 CET49910443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:28.673345089 CET44349910173.222.162.64192.168.2.6
                                    Jan 15, 2025 17:47:28.677135944 CET44349705173.222.162.64192.168.2.6
                                    Jan 15, 2025 17:47:28.677284002 CET44349705173.222.162.64192.168.2.6
                                    Jan 15, 2025 17:47:29.270440102 CET44349910173.222.162.64192.168.2.6
                                    Jan 15, 2025 17:47:29.270515919 CET49910443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:30.149133921 CET49932445192.168.2.6123.192.157.165
                                    Jan 15, 2025 17:47:30.154208899 CET44549932123.192.157.165192.168.2.6
                                    Jan 15, 2025 17:47:30.156364918 CET49932445192.168.2.6123.192.157.165
                                    Jan 15, 2025 17:47:30.159269094 CET49932445192.168.2.6123.192.157.165
                                    Jan 15, 2025 17:47:30.159516096 CET49933445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:30.164104939 CET44549932123.192.157.165192.168.2.6
                                    Jan 15, 2025 17:47:30.164172888 CET49932445192.168.2.6123.192.157.165
                                    Jan 15, 2025 17:47:30.164721966 CET44549933123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:30.164782047 CET49933445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:30.164876938 CET49933445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:30.165265083 CET49935445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:30.169894934 CET44549933123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:30.170002937 CET49933445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:30.170146942 CET44549935123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:30.170203924 CET49935445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:30.170232058 CET49935445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:30.175019026 CET44549935123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:32.163191080 CET49970445192.168.2.640.1.60.211
                                    Jan 15, 2025 17:47:32.167960882 CET4454997040.1.60.211192.168.2.6
                                    Jan 15, 2025 17:47:32.168019056 CET49970445192.168.2.640.1.60.211
                                    Jan 15, 2025 17:47:32.168044090 CET49970445192.168.2.640.1.60.211
                                    Jan 15, 2025 17:47:32.168186903 CET49971445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:32.172959089 CET4454997140.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:32.172970057 CET4454997040.1.60.211192.168.2.6
                                    Jan 15, 2025 17:47:32.173036098 CET49970445192.168.2.640.1.60.211
                                    Jan 15, 2025 17:47:32.173052073 CET49971445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:32.173155069 CET49971445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:32.173430920 CET49972445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:32.178030014 CET4454997140.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:32.178077936 CET49971445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:32.178219080 CET4454997240.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:32.178277969 CET49972445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:32.178306103 CET49972445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:32.183034897 CET4454997240.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:34.179055929 CET50005445192.168.2.614.222.195.122
                                    Jan 15, 2025 17:47:34.184484005 CET4455000514.222.195.122192.168.2.6
                                    Jan 15, 2025 17:47:34.184612989 CET50005445192.168.2.614.222.195.122
                                    Jan 15, 2025 17:47:34.184640884 CET50005445192.168.2.614.222.195.122
                                    Jan 15, 2025 17:47:34.184746027 CET50006445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:34.190301895 CET4455000514.222.195.122192.168.2.6
                                    Jan 15, 2025 17:47:34.190388918 CET50005445192.168.2.614.222.195.122
                                    Jan 15, 2025 17:47:34.190737963 CET4455000614.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:34.190807104 CET50006445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:34.190834999 CET50006445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:34.191288948 CET50007445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:34.196835995 CET4455000714.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:34.196919918 CET4455000614.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:34.196938992 CET50007445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:34.196971893 CET50006445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:34.197058916 CET50007445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:34.201812029 CET4455000714.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:34.764955044 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:34.764995098 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:34.765086889 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:34.765642881 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:34.765660048 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.557648897 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.557738066 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:35.564352036 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:35.564385891 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.564574957 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.566706896 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:35.566754103 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:35.566759109 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.566914082 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:35.607335091 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.738528013 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.738624096 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:35.738686085 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:35.738900900 CET50020443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:35.738924026 CET4435002040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:36.194664955 CET50044445192.168.2.6206.65.90.206
                                    Jan 15, 2025 17:47:36.199528933 CET44550044206.65.90.206192.168.2.6
                                    Jan 15, 2025 17:47:36.199609995 CET50044445192.168.2.6206.65.90.206
                                    Jan 15, 2025 17:47:36.199687958 CET50044445192.168.2.6206.65.90.206
                                    Jan 15, 2025 17:47:36.199881077 CET50045445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:36.204524994 CET44550044206.65.90.206192.168.2.6
                                    Jan 15, 2025 17:47:36.204585075 CET50044445192.168.2.6206.65.90.206
                                    Jan 15, 2025 17:47:36.204627991 CET44550045206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:47:36.204689980 CET50045445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:36.204720020 CET50045445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:36.204986095 CET50046445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:36.209732056 CET44550045206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:47:36.209779024 CET50045445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:36.209813118 CET44550046206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:47:36.209868908 CET50046445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:36.209906101 CET50046445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:36.214699030 CET44550046206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:47:38.210134983 CET50079445192.168.2.635.145.151.140
                                    Jan 15, 2025 17:47:38.215064049 CET4455007935.145.151.140192.168.2.6
                                    Jan 15, 2025 17:47:38.215157986 CET50079445192.168.2.635.145.151.140
                                    Jan 15, 2025 17:47:38.215341091 CET50079445192.168.2.635.145.151.140
                                    Jan 15, 2025 17:47:38.215559006 CET50080445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:38.220304966 CET4455007935.145.151.140192.168.2.6
                                    Jan 15, 2025 17:47:38.220365047 CET50079445192.168.2.635.145.151.140
                                    Jan 15, 2025 17:47:38.220433950 CET4455008035.145.151.1192.168.2.6
                                    Jan 15, 2025 17:47:38.220499039 CET50080445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:38.220532894 CET50080445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:38.220827103 CET50081445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:38.225435019 CET4455008035.145.151.1192.168.2.6
                                    Jan 15, 2025 17:47:38.225491047 CET50080445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:38.225670099 CET4455008135.145.151.1192.168.2.6
                                    Jan 15, 2025 17:47:38.225739002 CET50081445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:38.225795031 CET50081445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:38.230663061 CET4455008135.145.151.1192.168.2.6
                                    Jan 15, 2025 17:47:39.436357975 CET4454971816.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:39.436455011 CET49718445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:39.439452887 CET49718445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:39.439565897 CET49718445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:39.444221973 CET4454971816.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:39.444312096 CET4454971816.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:40.225577116 CET50119445192.168.2.6105.213.27.237
                                    Jan 15, 2025 17:47:40.230397940 CET44550119105.213.27.237192.168.2.6
                                    Jan 15, 2025 17:47:40.230495930 CET50119445192.168.2.6105.213.27.237
                                    Jan 15, 2025 17:47:40.230496883 CET50119445192.168.2.6105.213.27.237
                                    Jan 15, 2025 17:47:40.230590105 CET50120445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:47:40.235356092 CET44550120105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:47:40.235430002 CET50120445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:47:40.235440969 CET50120445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:47:40.235649109 CET44550119105.213.27.237192.168.2.6
                                    Jan 15, 2025 17:47:40.235707045 CET50119445192.168.2.6105.213.27.237
                                    Jan 15, 2025 17:47:40.235913992 CET50121445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:47:40.240361929 CET44550120105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:47:40.240433931 CET50120445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:47:40.240727901 CET44550121105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:47:40.240792036 CET50121445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:47:40.240839958 CET50121445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:47:40.245544910 CET44550121105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:47:41.456386089 CET4454974919.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:41.456448078 CET49749445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:41.456491947 CET49749445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:41.456577063 CET49749445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:41.461314917 CET4454974919.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:41.461337090 CET4454974919.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:42.241414070 CET50154445192.168.2.6152.164.46.230
                                    Jan 15, 2025 17:47:42.246299028 CET44550154152.164.46.230192.168.2.6
                                    Jan 15, 2025 17:47:42.246392012 CET50154445192.168.2.6152.164.46.230
                                    Jan 15, 2025 17:47:42.246392012 CET50154445192.168.2.6152.164.46.230
                                    Jan 15, 2025 17:47:42.246505976 CET50155445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:47:42.251291037 CET44550155152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:47:42.251342058 CET44550154152.164.46.230192.168.2.6
                                    Jan 15, 2025 17:47:42.251359940 CET50155445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:47:42.251374006 CET50155445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:47:42.251389027 CET50154445192.168.2.6152.164.46.230
                                    Jan 15, 2025 17:47:42.251660109 CET50156445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:47:42.256333113 CET44550155152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:47:42.256413937 CET50155445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:47:42.256421089 CET44550156152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:47:42.256479025 CET50156445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:47:42.256504059 CET50156445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:47:42.261293888 CET44550156152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:47:42.444283009 CET50162445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:42.449139118 CET4455016216.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:42.449203968 CET50162445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:42.449250937 CET50162445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:47:42.454035997 CET4455016216.50.237.1192.168.2.6
                                    Jan 15, 2025 17:47:43.501262903 CET4454978323.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:43.501395941 CET49783445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:43.501471043 CET49783445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:43.501554966 CET49783445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:43.506230116 CET4454978323.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:43.506330013 CET4454978323.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:44.259543896 CET50174445192.168.2.6145.229.6.225
                                    Jan 15, 2025 17:47:44.264316082 CET44550174145.229.6.225192.168.2.6
                                    Jan 15, 2025 17:47:44.264386892 CET50174445192.168.2.6145.229.6.225
                                    Jan 15, 2025 17:47:44.264453888 CET50174445192.168.2.6145.229.6.225
                                    Jan 15, 2025 17:47:44.264594078 CET50175445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:47:44.269359112 CET44550175145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:47:44.269416094 CET50175445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:47:44.269431114 CET50175445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:47:44.269510031 CET44550174145.229.6.225192.168.2.6
                                    Jan 15, 2025 17:47:44.269584894 CET50174445192.168.2.6145.229.6.225
                                    Jan 15, 2025 17:47:44.269973040 CET50176445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:47:44.275908947 CET44550175145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:47:44.275963068 CET50175445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:47:44.276240110 CET44550176145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:47:44.276372910 CET50176445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:47:44.276431084 CET50176445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:47:44.282773018 CET44550176145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:47:44.460148096 CET50177445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:44.464992046 CET4455017719.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:44.465084076 CET50177445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:44.465140104 CET50177445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:47:44.469928026 CET4455017719.64.25.1192.168.2.6
                                    Jan 15, 2025 17:47:45.499557972 CET44549823219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:45.499689102 CET49823445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:45.499747038 CET49823445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:45.499793053 CET49823445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:45.504632950 CET44549823219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:45.504662991 CET44549823219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:46.273129940 CET50190445192.168.2.6191.230.113.27
                                    Jan 15, 2025 17:47:46.278258085 CET44550190191.230.113.27192.168.2.6
                                    Jan 15, 2025 17:47:46.278487921 CET50190445192.168.2.6191.230.113.27
                                    Jan 15, 2025 17:47:46.278703928 CET50190445192.168.2.6191.230.113.27
                                    Jan 15, 2025 17:47:46.279202938 CET50191445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:47:46.283638000 CET44550190191.230.113.27192.168.2.6
                                    Jan 15, 2025 17:47:46.283725023 CET50190445192.168.2.6191.230.113.27
                                    Jan 15, 2025 17:47:46.284037113 CET44550191191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:47:46.284113884 CET50191445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:47:46.284152031 CET50191445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:47:46.284507990 CET50192445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:47:46.289196968 CET44550191191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:47:46.289307117 CET50191445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:47:46.289371967 CET44550192191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:47:46.289443970 CET50192445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:47:46.289485931 CET50192445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:47:46.294265985 CET44550192191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:47:46.506903887 CET50196445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:46.511946917 CET4455019623.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:46.512960911 CET50196445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:46.513041019 CET50196445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:47:46.517896891 CET4455019623.60.133.1192.168.2.6
                                    Jan 15, 2025 17:47:47.530986071 CET44549857146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:47.531106949 CET49857445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:47.531311035 CET49857445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:47.531616926 CET49857445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:47.536192894 CET44549857146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:47.536370993 CET44549857146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:48.288444042 CET50206445192.168.2.6198.0.119.77
                                    Jan 15, 2025 17:47:48.299256086 CET44550206198.0.119.77192.168.2.6
                                    Jan 15, 2025 17:47:48.299459934 CET50206445192.168.2.6198.0.119.77
                                    Jan 15, 2025 17:47:48.299587965 CET50206445192.168.2.6198.0.119.77
                                    Jan 15, 2025 17:47:48.299681902 CET50207445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:47:48.304888964 CET44550207198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:47:48.304964066 CET50207445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:47:48.304991961 CET44550206198.0.119.77192.168.2.6
                                    Jan 15, 2025 17:47:48.305075884 CET50207445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:47:48.305105925 CET50206445192.168.2.6198.0.119.77
                                    Jan 15, 2025 17:47:48.305344105 CET50209445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:47:48.309982061 CET44550207198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:47:48.310158014 CET44550209198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:47:48.310219049 CET50207445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:47:48.310235977 CET50209445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:47:48.310260057 CET50209445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:47:48.315088034 CET44550209198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:47:48.424825907 CET44349910173.222.162.64192.168.2.6
                                    Jan 15, 2025 17:47:48.424901009 CET49910443192.168.2.6173.222.162.64
                                    Jan 15, 2025 17:47:48.534585953 CET50210445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:48.539442062 CET44550210219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:48.539525032 CET50210445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:48.564321041 CET50210445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:47:48.569124937 CET44550210219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:47:49.530888081 CET4454989720.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:49.530999899 CET49897445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:49.531161070 CET49897445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:49.531240940 CET49897445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:49.535944939 CET4454989720.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:49.535983086 CET4454989720.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:50.303927898 CET50223445192.168.2.695.128.26.42
                                    Jan 15, 2025 17:47:50.308775902 CET4455022395.128.26.42192.168.2.6
                                    Jan 15, 2025 17:47:50.308861971 CET50223445192.168.2.695.128.26.42
                                    Jan 15, 2025 17:47:50.308917046 CET50223445192.168.2.695.128.26.42
                                    Jan 15, 2025 17:47:50.309036970 CET50224445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:50.313874960 CET4455022495.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:50.313957930 CET4455022395.128.26.42192.168.2.6
                                    Jan 15, 2025 17:47:50.313961983 CET50224445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:50.313961983 CET50224445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:50.314116001 CET50223445192.168.2.695.128.26.42
                                    Jan 15, 2025 17:47:50.314300060 CET50225445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:50.318873882 CET4455022495.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:50.318932056 CET50224445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:50.319087029 CET4455022595.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:50.319170952 CET50225445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:50.319195986 CET50225445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:50.323982954 CET4455022595.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:50.538151026 CET50228445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:50.543055058 CET44550228146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:50.544909000 CET50228445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:50.544955015 CET50228445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:47:50.549701929 CET44550228146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:47:51.536462069 CET44549935123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:51.536549091 CET49935445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:51.536590099 CET49935445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:51.536612988 CET49935445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:51.541488886 CET44549935123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:51.541518927 CET44549935123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:52.006678104 CET4455022595.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:52.006742001 CET50225445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:52.006762028 CET50225445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:52.006802082 CET50225445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:52.011584997 CET4455022595.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:52.011627913 CET4455022595.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:52.319634914 CET50240445192.168.2.6103.73.95.239
                                    Jan 15, 2025 17:47:52.324466944 CET44550240103.73.95.239192.168.2.6
                                    Jan 15, 2025 17:47:52.324562073 CET50240445192.168.2.6103.73.95.239
                                    Jan 15, 2025 17:47:52.324579954 CET50240445192.168.2.6103.73.95.239
                                    Jan 15, 2025 17:47:52.324671030 CET50241445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:47:52.329422951 CET44550241103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:47:52.329487085 CET50241445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:47:52.329504967 CET50241445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:47:52.329615116 CET44550240103.73.95.239192.168.2.6
                                    Jan 15, 2025 17:47:52.329658985 CET50240445192.168.2.6103.73.95.239
                                    Jan 15, 2025 17:47:52.329812050 CET50242445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:47:52.334434986 CET44550241103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:47:52.334491014 CET50241445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:47:52.334611893 CET44550242103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:47:52.334682941 CET50242445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:47:52.334698915 CET50242445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:47:52.339430094 CET44550242103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:47:52.538197994 CET50245445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:52.543138027 CET4455024520.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:52.543237925 CET50245445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:52.543281078 CET50245445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:47:52.548018932 CET4455024520.66.242.1192.168.2.6
                                    Jan 15, 2025 17:47:53.548300982 CET4454997240.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:53.548401117 CET49972445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:53.548460960 CET49972445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:53.548521042 CET49972445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:53.553296089 CET4454997240.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:53.553327084 CET4454997240.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:54.194544077 CET50257445192.168.2.6143.125.156.228
                                    Jan 15, 2025 17:47:54.199379921 CET44550257143.125.156.228192.168.2.6
                                    Jan 15, 2025 17:47:54.199459076 CET50257445192.168.2.6143.125.156.228
                                    Jan 15, 2025 17:47:54.199553013 CET50257445192.168.2.6143.125.156.228
                                    Jan 15, 2025 17:47:54.199790955 CET50258445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:47:54.204400063 CET44550257143.125.156.228192.168.2.6
                                    Jan 15, 2025 17:47:54.204458952 CET50257445192.168.2.6143.125.156.228
                                    Jan 15, 2025 17:47:54.204603910 CET44550258143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:47:54.204665899 CET50258445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:47:54.204684973 CET50258445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:47:54.205089092 CET50259445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:47:54.209680080 CET44550258143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:47:54.209736109 CET50258445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:47:54.209990978 CET44550259143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:47:54.210128069 CET50259445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:47:54.210128069 CET50259445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:47:54.214987993 CET44550259143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:47:54.540606976 CET50261445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:54.545567036 CET44550261123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:54.545633078 CET50261445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:54.545694113 CET50261445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:47:54.550494909 CET44550261123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:47:54.640305996 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:54.640336037 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:54.640431881 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:54.641005993 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:54.641022921 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.022392035 CET50267445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:55.027182102 CET4455026795.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:55.027259111 CET50267445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:55.027271032 CET50267445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:55.032113075 CET4455026795.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:55.458267927 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.458333015 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:55.459862947 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:55.459873915 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.460102081 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.461654902 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:55.461710930 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:55.461716890 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.461834908 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:55.503334999 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.567842960 CET4455000714.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:55.569056988 CET50007445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:55.569077969 CET50007445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:55.569123983 CET50007445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:55.574023962 CET4455000714.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:55.574055910 CET4455000714.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:55.633853912 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.633955002 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.634038925 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:55.634336948 CET50263443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:47:55.634356976 CET4435026340.115.3.253192.168.2.6
                                    Jan 15, 2025 17:47:55.944686890 CET50274445192.168.2.6146.245.78.167
                                    Jan 15, 2025 17:47:55.949584007 CET44550274146.245.78.167192.168.2.6
                                    Jan 15, 2025 17:47:55.952382088 CET50274445192.168.2.6146.245.78.167
                                    Jan 15, 2025 17:47:55.953856945 CET50274445192.168.2.6146.245.78.167
                                    Jan 15, 2025 17:47:55.954168081 CET50275445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:47:55.958640099 CET44550274146.245.78.167192.168.2.6
                                    Jan 15, 2025 17:47:55.958822966 CET50274445192.168.2.6146.245.78.167
                                    Jan 15, 2025 17:47:55.958986998 CET44550275146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:47:55.959048986 CET50275445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:47:55.959074020 CET50275445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:47:55.959372044 CET50276445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:47:55.964231968 CET44550276146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:47:55.964301109 CET50276445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:47:55.964319944 CET50276445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:47:55.964854956 CET44550275146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:47:55.964905024 CET50275445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:47:55.969099998 CET44550276146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:47:56.553643942 CET50281445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:56.558490038 CET4455028140.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:56.558563948 CET50281445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:56.558578968 CET50281445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:47:56.563986063 CET4455028140.1.60.1192.168.2.6
                                    Jan 15, 2025 17:47:56.707154989 CET4455026795.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:56.707220078 CET50267445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:56.707247972 CET50267445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:56.707277060 CET50267445192.168.2.695.128.26.1
                                    Jan 15, 2025 17:47:56.712070942 CET4455026795.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:56.712085009 CET4455026795.128.26.1192.168.2.6
                                    Jan 15, 2025 17:47:56.772620916 CET50283445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:47:56.777429104 CET4455028395.128.26.2192.168.2.6
                                    Jan 15, 2025 17:47:56.777528048 CET50283445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:47:56.777606010 CET50283445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:47:56.778100967 CET50284445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:47:56.782546997 CET4455028395.128.26.2192.168.2.6
                                    Jan 15, 2025 17:47:56.782609940 CET50283445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:47:56.782928944 CET4455028495.128.26.2192.168.2.6
                                    Jan 15, 2025 17:47:56.782996893 CET50284445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:47:56.783031940 CET50284445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:47:56.787817001 CET4455028495.128.26.2192.168.2.6
                                    Jan 15, 2025 17:47:57.577913046 CET44550046206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:47:57.578022003 CET50046445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:57.578022003 CET50046445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:57.578110933 CET50046445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:47:57.582921028 CET44550046206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:47:57.582935095 CET44550046206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:47:57.585118055 CET50290445192.168.2.676.104.214.135
                                    Jan 15, 2025 17:47:57.590065956 CET4455029076.104.214.135192.168.2.6
                                    Jan 15, 2025 17:47:57.590131998 CET50290445192.168.2.676.104.214.135
                                    Jan 15, 2025 17:47:57.590167999 CET50290445192.168.2.676.104.214.135
                                    Jan 15, 2025 17:47:57.590349913 CET50291445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:47:57.595208883 CET4455029076.104.214.135192.168.2.6
                                    Jan 15, 2025 17:47:57.595223904 CET4455029176.104.214.1192.168.2.6
                                    Jan 15, 2025 17:47:57.595268965 CET50290445192.168.2.676.104.214.135
                                    Jan 15, 2025 17:47:57.595303059 CET50291445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:47:57.595370054 CET50291445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:47:57.595618963 CET50292445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:47:57.600367069 CET4455029176.104.214.1192.168.2.6
                                    Jan 15, 2025 17:47:57.600397110 CET4455029276.104.214.1192.168.2.6
                                    Jan 15, 2025 17:47:57.600433111 CET50291445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:47:57.600475073 CET50292445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:47:57.600476027 CET50292445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:47:57.605283022 CET4455029276.104.214.1192.168.2.6
                                    Jan 15, 2025 17:47:58.584971905 CET50300445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:58.590234995 CET4455030014.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:58.590312958 CET50300445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:58.590348959 CET50300445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:47:58.595149994 CET4455030014.222.195.1192.168.2.6
                                    Jan 15, 2025 17:47:59.116605043 CET50303445192.168.2.624.191.188.106
                                    Jan 15, 2025 17:47:59.159652948 CET4455030324.191.188.106192.168.2.6
                                    Jan 15, 2025 17:47:59.159832954 CET50303445192.168.2.624.191.188.106
                                    Jan 15, 2025 17:47:59.159832954 CET50303445192.168.2.624.191.188.106
                                    Jan 15, 2025 17:47:59.160046101 CET50304445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:47:59.164777994 CET4455030324.191.188.106192.168.2.6
                                    Jan 15, 2025 17:47:59.164834023 CET50303445192.168.2.624.191.188.106
                                    Jan 15, 2025 17:47:59.164892912 CET4455030424.191.188.1192.168.2.6
                                    Jan 15, 2025 17:47:59.164952993 CET50304445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:47:59.164994001 CET50304445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:47:59.165255070 CET50305445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:47:59.169955015 CET4455030424.191.188.1192.168.2.6
                                    Jan 15, 2025 17:47:59.170039892 CET50304445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:47:59.170079947 CET4455030524.191.188.1192.168.2.6
                                    Jan 15, 2025 17:47:59.170160055 CET50305445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:47:59.170201063 CET50305445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:47:59.174926996 CET4455030524.191.188.1192.168.2.6
                                    Jan 15, 2025 17:47:59.597434998 CET4455008135.145.151.1192.168.2.6
                                    Jan 15, 2025 17:47:59.597549915 CET50081445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:59.597604036 CET50081445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:59.597659111 CET50081445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:47:59.602493048 CET4455008135.145.151.1192.168.2.6
                                    Jan 15, 2025 17:47:59.602509022 CET4455008135.145.151.1192.168.2.6
                                    Jan 15, 2025 17:48:00.540724993 CET50315445192.168.2.6195.128.239.243
                                    Jan 15, 2025 17:48:00.545813084 CET44550315195.128.239.243192.168.2.6
                                    Jan 15, 2025 17:48:00.545890093 CET50315445192.168.2.6195.128.239.243
                                    Jan 15, 2025 17:48:00.545943022 CET50315445192.168.2.6195.128.239.243
                                    Jan 15, 2025 17:48:00.546062946 CET50316445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:00.551007032 CET44550316195.128.239.1192.168.2.6
                                    Jan 15, 2025 17:48:00.551021099 CET44550315195.128.239.243192.168.2.6
                                    Jan 15, 2025 17:48:00.551069975 CET50316445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:00.551100016 CET50315445192.168.2.6195.128.239.243
                                    Jan 15, 2025 17:48:00.551168919 CET50316445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:00.551426888 CET50317445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:00.556019068 CET44550316195.128.239.1192.168.2.6
                                    Jan 15, 2025 17:48:00.556080103 CET50316445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:00.556452990 CET44550317195.128.239.1192.168.2.6
                                    Jan 15, 2025 17:48:00.556509018 CET50317445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:00.556540966 CET50317445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:00.561331987 CET44550317195.128.239.1192.168.2.6
                                    Jan 15, 2025 17:48:00.584872961 CET50318445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:48:00.589903116 CET44550318206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:48:00.590104103 CET50318445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:48:00.590147018 CET50318445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:48:00.594926119 CET44550318206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:48:01.594402075 CET44550121105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:48:01.594559908 CET50121445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:48:01.594594002 CET50121445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:48:01.594623089 CET50121445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:48:01.599385023 CET44550121105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:48:01.599411964 CET44550121105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:48:01.866652012 CET50324445192.168.2.6202.206.173.165
                                    Jan 15, 2025 17:48:01.871479988 CET44550324202.206.173.165192.168.2.6
                                    Jan 15, 2025 17:48:01.871547937 CET50324445192.168.2.6202.206.173.165
                                    Jan 15, 2025 17:48:01.871565104 CET50324445192.168.2.6202.206.173.165
                                    Jan 15, 2025 17:48:01.871761084 CET50325445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:01.876555920 CET44550324202.206.173.165192.168.2.6
                                    Jan 15, 2025 17:48:01.876588106 CET44550325202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:01.876606941 CET50324445192.168.2.6202.206.173.165
                                    Jan 15, 2025 17:48:01.876663923 CET50325445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:01.876745939 CET50325445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:01.877048016 CET50326445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:01.881686926 CET44550325202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:01.881745100 CET50325445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:01.881880999 CET44550326202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:01.881936073 CET50326445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:01.881958008 CET50326445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:01.886769056 CET44550326202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:02.600725889 CET50330445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:48:02.606215954 CET4455033035.145.151.1192.168.2.6
                                    Jan 15, 2025 17:48:02.606331110 CET50330445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:48:02.606467009 CET50330445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:48:02.611296892 CET4455033035.145.151.1192.168.2.6
                                    Jan 15, 2025 17:48:03.116358042 CET50333445192.168.2.672.37.75.129
                                    Jan 15, 2025 17:48:03.121277094 CET4455033372.37.75.129192.168.2.6
                                    Jan 15, 2025 17:48:03.121340036 CET50333445192.168.2.672.37.75.129
                                    Jan 15, 2025 17:48:03.121398926 CET50333445192.168.2.672.37.75.129
                                    Jan 15, 2025 17:48:03.121566057 CET50334445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:03.126367092 CET4455033472.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:03.126425028 CET50334445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:03.126445055 CET4455033372.37.75.129192.168.2.6
                                    Jan 15, 2025 17:48:03.126463890 CET50334445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:03.126490116 CET50333445192.168.2.672.37.75.129
                                    Jan 15, 2025 17:48:03.126740932 CET50335445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:03.131469965 CET4455033472.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:03.131535053 CET50334445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:03.131576061 CET4455033572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:03.131622076 CET50335445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:03.131675959 CET50335445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:03.136514902 CET4455033572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:03.625701904 CET44550156152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:48:03.625786066 CET50156445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:48:03.625827074 CET50156445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:48:03.625885963 CET50156445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:48:03.630575895 CET44550156152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:48:03.630597115 CET44550156152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:48:03.796750069 CET4455016216.50.237.1192.168.2.6
                                    Jan 15, 2025 17:48:03.796871901 CET50162445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:48:03.796915054 CET50162445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:48:03.796989918 CET50162445192.168.2.616.50.237.1
                                    Jan 15, 2025 17:48:03.801685095 CET4455016216.50.237.1192.168.2.6
                                    Jan 15, 2025 17:48:03.801728964 CET4455016216.50.237.1192.168.2.6
                                    Jan 15, 2025 17:48:03.850658894 CET50336445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:03.855593920 CET4455033616.50.237.2192.168.2.6
                                    Jan 15, 2025 17:48:03.855669975 CET50336445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:03.855706930 CET50336445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:03.856071949 CET50337445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:03.860657930 CET4455033616.50.237.2192.168.2.6
                                    Jan 15, 2025 17:48:03.860719919 CET50336445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:03.860874891 CET4455033716.50.237.2192.168.2.6
                                    Jan 15, 2025 17:48:03.860935926 CET50337445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:03.860971928 CET50337445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:03.865712881 CET4455033716.50.237.2192.168.2.6
                                    Jan 15, 2025 17:48:04.272916079 CET50338445192.168.2.660.58.95.122
                                    Jan 15, 2025 17:48:04.277708054 CET4455033860.58.95.122192.168.2.6
                                    Jan 15, 2025 17:48:04.278109074 CET50338445192.168.2.660.58.95.122
                                    Jan 15, 2025 17:48:04.278134108 CET50338445192.168.2.660.58.95.122
                                    Jan 15, 2025 17:48:04.278235912 CET50339445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:04.283044100 CET4455033960.58.95.1192.168.2.6
                                    Jan 15, 2025 17:48:04.283241987 CET4455033860.58.95.122192.168.2.6
                                    Jan 15, 2025 17:48:04.283360958 CET50338445192.168.2.660.58.95.122
                                    Jan 15, 2025 17:48:04.283418894 CET50339445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:04.283418894 CET50339445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:04.283680916 CET50340445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:04.288418055 CET4455033960.58.95.1192.168.2.6
                                    Jan 15, 2025 17:48:04.288450003 CET4455034060.58.95.1192.168.2.6
                                    Jan 15, 2025 17:48:04.288506031 CET50339445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:04.288542032 CET50340445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:04.288587093 CET50340445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:04.293346882 CET4455034060.58.95.1192.168.2.6
                                    Jan 15, 2025 17:48:04.600490093 CET50341445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:48:04.605559111 CET44550341105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:48:04.606076002 CET50341445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:48:04.606121063 CET50341445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:48:04.610954046 CET44550341105.213.27.1192.168.2.6
                                    Jan 15, 2025 17:48:04.614634991 CET4455033572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:04.616111040 CET50335445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:04.616111040 CET50335445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:04.616173983 CET50335445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:04.620950937 CET4455033572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:04.620960951 CET4455033572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:05.389981031 CET50343445192.168.2.642.199.188.117
                                    Jan 15, 2025 17:48:05.394859076 CET4455034342.199.188.117192.168.2.6
                                    Jan 15, 2025 17:48:05.394937038 CET50343445192.168.2.642.199.188.117
                                    Jan 15, 2025 17:48:05.395021915 CET50343445192.168.2.642.199.188.117
                                    Jan 15, 2025 17:48:05.395183086 CET50344445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:05.400482893 CET4455034442.199.188.1192.168.2.6
                                    Jan 15, 2025 17:48:05.400552034 CET50344445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:05.400598049 CET50344445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:05.403420925 CET4455034342.199.188.117192.168.2.6
                                    Jan 15, 2025 17:48:05.407437086 CET4455034442.199.188.1192.168.2.6
                                    Jan 15, 2025 17:48:05.429672956 CET4455034342.199.188.117192.168.2.6
                                    Jan 15, 2025 17:48:05.429686069 CET4455034442.199.188.1192.168.2.6
                                    Jan 15, 2025 17:48:05.429778099 CET50343445192.168.2.642.199.188.117
                                    Jan 15, 2025 17:48:05.429800034 CET50344445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:05.457395077 CET50345445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:05.462186098 CET4455034542.199.188.1192.168.2.6
                                    Jan 15, 2025 17:48:05.462246895 CET50345445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:05.465909958 CET50345445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:05.470699072 CET4455034542.199.188.1192.168.2.6
                                    Jan 15, 2025 17:48:05.656141996 CET44550176145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:48:05.656289101 CET50176445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:48:05.660666943 CET50176445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:48:05.660711050 CET50176445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:48:05.665641069 CET44550176145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:48:05.665683985 CET44550176145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:48:05.811902046 CET4455017719.64.25.1192.168.2.6
                                    Jan 15, 2025 17:48:05.812077045 CET50177445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:48:05.812186003 CET50177445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:48:05.812186003 CET50177445192.168.2.619.64.25.1
                                    Jan 15, 2025 17:48:05.817171097 CET4455017719.64.25.1192.168.2.6
                                    Jan 15, 2025 17:48:05.817187071 CET4455017719.64.25.1192.168.2.6
                                    Jan 15, 2025 17:48:05.866250992 CET50346445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:05.871258020 CET4455034619.64.25.2192.168.2.6
                                    Jan 15, 2025 17:48:05.871345997 CET50346445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:05.871390104 CET50346445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:05.871723890 CET50347445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:05.876595974 CET4455034619.64.25.2192.168.2.6
                                    Jan 15, 2025 17:48:05.876621008 CET4455034719.64.25.2192.168.2.6
                                    Jan 15, 2025 17:48:05.876672983 CET50346445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:05.876707077 CET50347445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:05.876732111 CET50347445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:05.881581068 CET4455034719.64.25.2192.168.2.6
                                    Jan 15, 2025 17:48:06.397802114 CET50348445192.168.2.679.11.33.150
                                    Jan 15, 2025 17:48:06.403249979 CET4455034879.11.33.150192.168.2.6
                                    Jan 15, 2025 17:48:06.406080961 CET50348445192.168.2.679.11.33.150
                                    Jan 15, 2025 17:48:06.406111002 CET50348445192.168.2.679.11.33.150
                                    Jan 15, 2025 17:48:06.406223059 CET50349445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:06.411084890 CET4455034979.11.33.1192.168.2.6
                                    Jan 15, 2025 17:48:06.411478043 CET4455034879.11.33.150192.168.2.6
                                    Jan 15, 2025 17:48:06.411607981 CET50349445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:06.411726952 CET50349445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:06.412175894 CET50350445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:06.417088032 CET4455035079.11.33.1192.168.2.6
                                    Jan 15, 2025 17:48:06.418066025 CET50350445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:06.418118000 CET50350445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:06.419687986 CET4455034979.11.33.1192.168.2.6
                                    Jan 15, 2025 17:48:06.422976017 CET4455035079.11.33.1192.168.2.6
                                    Jan 15, 2025 17:48:06.440300941 CET4455034879.11.33.150192.168.2.6
                                    Jan 15, 2025 17:48:06.440335035 CET4455034979.11.33.1192.168.2.6
                                    Jan 15, 2025 17:48:06.440433025 CET50348445192.168.2.679.11.33.150
                                    Jan 15, 2025 17:48:06.442018032 CET50349445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:06.631781101 CET50351445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:48:06.636837959 CET44550351152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:48:06.638087034 CET50351445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:48:06.638114929 CET50351445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:48:06.642986059 CET44550351152.164.46.1192.168.2.6
                                    Jan 15, 2025 17:48:07.335386992 CET50352445192.168.2.647.217.208.213
                                    Jan 15, 2025 17:48:07.341026068 CET4455035247.217.208.213192.168.2.6
                                    Jan 15, 2025 17:48:07.342094898 CET50352445192.168.2.647.217.208.213
                                    Jan 15, 2025 17:48:07.342122078 CET50352445192.168.2.647.217.208.213
                                    Jan 15, 2025 17:48:07.342361927 CET50353445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:07.347198009 CET4455035347.217.208.1192.168.2.6
                                    Jan 15, 2025 17:48:07.347364902 CET4455035247.217.208.213192.168.2.6
                                    Jan 15, 2025 17:48:07.347464085 CET50352445192.168.2.647.217.208.213
                                    Jan 15, 2025 17:48:07.347481966 CET50353445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:07.347578049 CET50353445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:07.347953081 CET50354445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:07.352410078 CET4455035347.217.208.1192.168.2.6
                                    Jan 15, 2025 17:48:07.352857113 CET4455035447.217.208.1192.168.2.6
                                    Jan 15, 2025 17:48:07.352912903 CET50353445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:07.352941990 CET50354445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:07.352988005 CET50354445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:07.357975006 CET4455035447.217.208.1192.168.2.6
                                    Jan 15, 2025 17:48:07.631789923 CET50355445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:07.637173891 CET4455035572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:07.640489101 CET50355445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:07.640538931 CET50355445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:07.645293951 CET4455035572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:07.656172991 CET44550192191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:48:07.660044909 CET50192445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:48:07.660078049 CET50192445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:48:07.660125017 CET50192445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:48:07.664958954 CET44550192191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:48:07.664969921 CET44550192191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:48:07.876935005 CET4455019623.60.133.1192.168.2.6
                                    Jan 15, 2025 17:48:07.877144098 CET50196445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:48:07.877410889 CET50196445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:48:07.877465963 CET50196445192.168.2.623.60.133.1
                                    Jan 15, 2025 17:48:07.882241964 CET4455019623.60.133.1192.168.2.6
                                    Jan 15, 2025 17:48:07.882257938 CET4455019623.60.133.1192.168.2.6
                                    Jan 15, 2025 17:48:07.936777115 CET50356445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:07.941792965 CET4455035623.60.133.2192.168.2.6
                                    Jan 15, 2025 17:48:07.941914082 CET50356445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:07.941943884 CET50356445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:07.942253113 CET50357445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:07.946969032 CET4455035623.60.133.2192.168.2.6
                                    Jan 15, 2025 17:48:07.947056055 CET4455035723.60.133.2192.168.2.6
                                    Jan 15, 2025 17:48:07.947164059 CET50356445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:07.947257996 CET50357445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:07.947280884 CET50357445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:07.952095985 CET4455035723.60.133.2192.168.2.6
                                    Jan 15, 2025 17:48:08.210468054 CET50358445192.168.2.6154.92.211.86
                                    Jan 15, 2025 17:48:08.215596914 CET44550358154.92.211.86192.168.2.6
                                    Jan 15, 2025 17:48:08.215742111 CET50358445192.168.2.6154.92.211.86
                                    Jan 15, 2025 17:48:08.215790987 CET50358445192.168.2.6154.92.211.86
                                    Jan 15, 2025 17:48:08.215939999 CET50359445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:08.220828056 CET44550359154.92.211.1192.168.2.6
                                    Jan 15, 2025 17:48:08.220861912 CET44550358154.92.211.86192.168.2.6
                                    Jan 15, 2025 17:48:08.220901012 CET50359445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:08.220930099 CET50358445192.168.2.6154.92.211.86
                                    Jan 15, 2025 17:48:08.220968962 CET50359445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:08.221333027 CET50360445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:08.225883961 CET44550359154.92.211.1192.168.2.6
                                    Jan 15, 2025 17:48:08.225943089 CET50359445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:08.226138115 CET44550360154.92.211.1192.168.2.6
                                    Jan 15, 2025 17:48:08.226202965 CET50360445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:08.226239920 CET50360445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:08.230987072 CET44550360154.92.211.1192.168.2.6
                                    Jan 15, 2025 17:48:08.663053989 CET50361445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:48:08.668184996 CET44550361145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:48:08.668267965 CET50361445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:48:08.668308020 CET50361445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:48:08.673122883 CET44550361145.229.6.1192.168.2.6
                                    Jan 15, 2025 17:48:09.038558006 CET50362445192.168.2.6182.30.213.111
                                    Jan 15, 2025 17:48:09.043530941 CET44550362182.30.213.111192.168.2.6
                                    Jan 15, 2025 17:48:09.043657064 CET50362445192.168.2.6182.30.213.111
                                    Jan 15, 2025 17:48:09.043765068 CET50362445192.168.2.6182.30.213.111
                                    Jan 15, 2025 17:48:09.043986082 CET50363445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:09.048840046 CET44550363182.30.213.1192.168.2.6
                                    Jan 15, 2025 17:48:09.048986912 CET50363445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:09.048986912 CET50363445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:09.049010038 CET44550362182.30.213.111192.168.2.6
                                    Jan 15, 2025 17:48:09.049141884 CET50362445192.168.2.6182.30.213.111
                                    Jan 15, 2025 17:48:09.049252987 CET50364445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:09.054044008 CET44550363182.30.213.1192.168.2.6
                                    Jan 15, 2025 17:48:09.054058075 CET44550364182.30.213.1192.168.2.6
                                    Jan 15, 2025 17:48:09.054125071 CET50363445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:09.054168940 CET50364445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:09.054208994 CET50364445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:09.058938980 CET44550364182.30.213.1192.168.2.6
                                    Jan 15, 2025 17:48:09.115550995 CET4455035572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:09.115639925 CET50355445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:09.115679979 CET50355445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:09.115703106 CET50355445192.168.2.672.37.75.1
                                    Jan 15, 2025 17:48:09.120488882 CET4455035572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:09.120501041 CET4455035572.37.75.1192.168.2.6
                                    Jan 15, 2025 17:48:09.178889990 CET50365445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:09.183872938 CET4455036572.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:09.184011936 CET50365445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:09.184114933 CET50365445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:09.184509993 CET50366445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:09.189224005 CET4455036572.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:09.189312935 CET50365445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:09.189318895 CET4455036672.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:09.189397097 CET50366445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:09.189428091 CET50366445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:09.194181919 CET4455036672.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:09.318013906 CET44550326202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:09.318268061 CET50326445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:09.318268061 CET50326445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:09.318268061 CET50326445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:09.323251963 CET44550326202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:09.323265076 CET44550326202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:09.732167959 CET44550209198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:48:09.732336998 CET50209445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:48:09.732419014 CET50209445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:48:09.732477903 CET50209445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:48:09.737303972 CET44550209198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:48:09.737314939 CET44550209198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:48:09.804675102 CET50367445192.168.2.6179.112.165.13
                                    Jan 15, 2025 17:48:09.809510946 CET44550367179.112.165.13192.168.2.6
                                    Jan 15, 2025 17:48:09.809601068 CET50367445192.168.2.6179.112.165.13
                                    Jan 15, 2025 17:48:09.810966015 CET50367445192.168.2.6179.112.165.13
                                    Jan 15, 2025 17:48:09.811142921 CET50368445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:09.815761089 CET44550367179.112.165.13192.168.2.6
                                    Jan 15, 2025 17:48:09.815821886 CET50367445192.168.2.6179.112.165.13
                                    Jan 15, 2025 17:48:09.816005945 CET44550368179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:09.816062927 CET50368445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:09.816093922 CET50368445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:09.816560030 CET50369445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:09.821048975 CET44550368179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:09.821096897 CET50368445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:09.821332932 CET44550369179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:09.821394920 CET50369445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:09.821430922 CET50369445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:09.826167107 CET44550369179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:09.923827887 CET44550210219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:48:09.923916101 CET50210445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:48:09.923978090 CET50210445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:48:09.924031973 CET50210445192.168.2.6219.105.215.1
                                    Jan 15, 2025 17:48:09.928736925 CET44550210219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:48:09.928756952 CET44550210219.105.215.1192.168.2.6
                                    Jan 15, 2025 17:48:09.975692034 CET50370445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:09.980633974 CET44550370219.105.215.2192.168.2.6
                                    Jan 15, 2025 17:48:09.980715990 CET50370445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:09.980756998 CET50370445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:09.981053114 CET50371445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:09.985650063 CET44550370219.105.215.2192.168.2.6
                                    Jan 15, 2025 17:48:09.985719919 CET50370445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:09.985958099 CET44550371219.105.215.2192.168.2.6
                                    Jan 15, 2025 17:48:09.986072063 CET50371445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:09.986133099 CET50371445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:09.990955114 CET44550371219.105.215.2192.168.2.6
                                    Jan 15, 2025 17:48:10.663191080 CET50373445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:48:10.668143034 CET44550373191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:48:10.668232918 CET50373445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:48:10.668267965 CET50373445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:48:10.673144102 CET44550373191.230.113.1192.168.2.6
                                    Jan 15, 2025 17:48:10.738553047 CET4455036672.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:10.738825083 CET50366445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:10.738825083 CET50366445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:10.738825083 CET50366445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:10.743746996 CET4455036672.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:10.743761063 CET4455036672.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:11.922055960 CET44550228146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:48:11.922254086 CET50228445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:48:11.922317982 CET50228445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:48:11.922389984 CET50228445192.168.2.6146.131.129.1
                                    Jan 15, 2025 17:48:11.927252054 CET44550228146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:48:11.927287102 CET44550228146.131.129.1192.168.2.6
                                    Jan 15, 2025 17:48:11.975558996 CET50377445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:11.981344938 CET44550377146.131.129.2192.168.2.6
                                    Jan 15, 2025 17:48:11.981437922 CET50377445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:11.981462002 CET50377445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:11.981786013 CET50378445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:11.987154007 CET44550378146.131.129.2192.168.2.6
                                    Jan 15, 2025 17:48:11.987236023 CET50378445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:11.987282038 CET50378445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:11.987400055 CET44550377146.131.129.2192.168.2.6
                                    Jan 15, 2025 17:48:11.987458944 CET50377445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:11.992121935 CET44550378146.131.129.2192.168.2.6
                                    Jan 15, 2025 17:48:12.319303989 CET50379445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:12.324415922 CET44550379202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:12.324523926 CET50379445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:12.324551105 CET50379445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:12.329538107 CET44550379202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:12.713768959 CET44550369179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:12.713859081 CET50369445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:12.713903904 CET50369445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:12.713939905 CET50369445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:12.718846083 CET44550369179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:12.718858957 CET44550369179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:12.741287947 CET50382445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:48:12.746197939 CET44550382198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:48:12.746383905 CET50382445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:48:12.746495962 CET50382445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:48:12.751462936 CET44550382198.0.119.1192.168.2.6
                                    Jan 15, 2025 17:48:13.720666885 CET44550242103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:48:13.720748901 CET50242445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:48:13.720796108 CET50242445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:48:13.720812082 CET50242445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:48:13.725712061 CET44550242103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:48:13.725744009 CET44550242103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:48:13.741120100 CET50389445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:13.746366024 CET4455038972.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:13.746454000 CET50389445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:13.746476889 CET50389445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:13.751441956 CET4455038972.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:13.906428099 CET4455024520.66.242.1192.168.2.6
                                    Jan 15, 2025 17:48:13.906537056 CET50245445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:48:13.906564951 CET50245445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:48:13.906622887 CET50245445192.168.2.620.66.242.1
                                    Jan 15, 2025 17:48:13.911613941 CET4455024520.66.242.1192.168.2.6
                                    Jan 15, 2025 17:48:13.911653996 CET4455024520.66.242.1192.168.2.6
                                    Jan 15, 2025 17:48:13.960376024 CET50391445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:13.965439081 CET4455039120.66.242.2192.168.2.6
                                    Jan 15, 2025 17:48:13.965553999 CET50391445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:13.965653896 CET50391445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:13.966028929 CET50393445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:13.970582008 CET4455039120.66.242.2192.168.2.6
                                    Jan 15, 2025 17:48:13.970673084 CET50391445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:13.970858097 CET4455039320.66.242.2192.168.2.6
                                    Jan 15, 2025 17:48:13.970925093 CET50393445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:13.970974922 CET50393445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:13.975848913 CET4455039320.66.242.2192.168.2.6
                                    Jan 15, 2025 17:48:15.255903959 CET4455038972.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:15.256057024 CET50389445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:15.256103039 CET50389445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:15.256207943 CET50389445192.168.2.672.37.75.2
                                    Jan 15, 2025 17:48:15.260958910 CET4455038972.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:15.260972977 CET4455038972.37.75.2192.168.2.6
                                    Jan 15, 2025 17:48:15.319421053 CET50406445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:15.324394941 CET4455040672.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:15.324592113 CET50406445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:15.324717045 CET50406445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:15.325076103 CET50407445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:15.329741001 CET4455040672.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:15.329839945 CET50406445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:15.329963923 CET4455040772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:15.330041885 CET50407445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:15.330073118 CET50407445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:15.334884882 CET4455040772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:15.582408905 CET44550259143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:48:15.582473040 CET50259445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:48:15.582508087 CET50259445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:48:15.582547903 CET50259445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:48:15.587380886 CET44550259143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:48:15.587408066 CET44550259143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:48:15.725507021 CET50412445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:15.730386972 CET44550412179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:15.732244968 CET50412445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:15.732294083 CET50412445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:15.737075090 CET44550412179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:15.921979904 CET44550261123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:48:15.924096107 CET50261445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:48:15.924154997 CET50261445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:48:15.924154997 CET50261445192.168.2.6123.192.157.1
                                    Jan 15, 2025 17:48:15.929631948 CET44550261123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:48:15.929646015 CET44550261123.192.157.1192.168.2.6
                                    Jan 15, 2025 17:48:15.975497007 CET50416445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:15.980518103 CET44550416123.192.157.2192.168.2.6
                                    Jan 15, 2025 17:48:15.982125044 CET50416445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:15.982125044 CET50416445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:15.982372046 CET50417445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:15.987185001 CET44550417123.192.157.2192.168.2.6
                                    Jan 15, 2025 17:48:15.987296104 CET44550416123.192.157.2192.168.2.6
                                    Jan 15, 2025 17:48:15.987371922 CET50416445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:15.987437963 CET50417445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:15.987437963 CET50417445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:15.992222071 CET44550417123.192.157.2192.168.2.6
                                    Jan 15, 2025 17:48:16.789089918 CET50427445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:48:16.794239998 CET44550427103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:48:16.794430017 CET50427445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:48:16.802927971 CET50427445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:48:16.807765007 CET44550427103.73.95.1192.168.2.6
                                    Jan 15, 2025 17:48:16.812813044 CET4455040772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:16.812896967 CET50407445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:16.817708969 CET50407445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:16.817781925 CET50407445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:16.822542906 CET4455040772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:16.822657108 CET4455040772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:17.329396963 CET44550276146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:48:17.329592943 CET50276445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:48:17.329636097 CET50276445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:48:17.329674959 CET50276445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:48:17.334614038 CET44550276146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:48:17.334625006 CET44550276146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:48:17.739164114 CET44550412179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:17.739368916 CET50412445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:17.739433050 CET50412445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:17.739469051 CET50412445192.168.2.6179.112.165.1
                                    Jan 15, 2025 17:48:17.744446039 CET44550412179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:17.744477034 CET44550412179.112.165.1192.168.2.6
                                    Jan 15, 2025 17:48:17.803683996 CET50446445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:17.808891058 CET44550446179.112.165.2192.168.2.6
                                    Jan 15, 2025 17:48:17.809118032 CET50446445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:17.809160948 CET50446445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:17.809591055 CET50447445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:17.814212084 CET44550446179.112.165.2192.168.2.6
                                    Jan 15, 2025 17:48:17.814331055 CET50446445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:17.814446926 CET44550447179.112.165.2192.168.2.6
                                    Jan 15, 2025 17:48:17.814558983 CET50447445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:17.814620018 CET50447445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:17.819473982 CET44550447179.112.165.2192.168.2.6
                                    Jan 15, 2025 17:48:17.922777891 CET4455028140.1.60.1192.168.2.6
                                    Jan 15, 2025 17:48:17.924170971 CET50281445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:48:17.924210072 CET50281445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:48:17.924245119 CET50281445192.168.2.640.1.60.1
                                    Jan 15, 2025 17:48:17.929205894 CET4455028140.1.60.1192.168.2.6
                                    Jan 15, 2025 17:48:17.929239988 CET4455028140.1.60.1192.168.2.6
                                    Jan 15, 2025 17:48:17.975568056 CET50451445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:17.980402946 CET4455045140.1.60.2192.168.2.6
                                    Jan 15, 2025 17:48:17.981667995 CET50451445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:17.981781960 CET50451445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:17.982219934 CET50452445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:17.986732960 CET4455045140.1.60.2192.168.2.6
                                    Jan 15, 2025 17:48:17.986963034 CET4455045240.1.60.2192.168.2.6
                                    Jan 15, 2025 17:48:17.987035036 CET50451445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:17.987066984 CET50452445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:17.987116098 CET50452445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:17.991867065 CET4455045240.1.60.2192.168.2.6
                                    Jan 15, 2025 17:48:18.140738964 CET4455028495.128.26.2192.168.2.6
                                    Jan 15, 2025 17:48:18.140861034 CET50284445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:48:18.140944958 CET50284445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:48:18.140997887 CET50284445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:48:18.145754099 CET4455028495.128.26.2192.168.2.6
                                    Jan 15, 2025 17:48:18.145809889 CET4455028495.128.26.2192.168.2.6
                                    Jan 15, 2025 17:48:18.585077047 CET50468445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:48:18.590372086 CET44550468143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:48:18.590511084 CET50468445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:48:18.590555906 CET50468445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:48:18.596082926 CET44550468143.125.156.1192.168.2.6
                                    Jan 15, 2025 17:48:18.988568068 CET4455029276.104.214.1192.168.2.6
                                    Jan 15, 2025 17:48:18.988776922 CET50292445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:48:18.988838911 CET50292445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:48:18.988838911 CET50292445192.168.2.676.104.214.1
                                    Jan 15, 2025 17:48:18.993735075 CET4455029276.104.214.1192.168.2.6
                                    Jan 15, 2025 17:48:18.993768930 CET4455029276.104.214.1192.168.2.6
                                    Jan 15, 2025 17:48:19.692615032 CET44550379202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:19.692881107 CET50379445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:19.692949057 CET50379445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:19.692949057 CET50379445192.168.2.6202.206.173.1
                                    Jan 15, 2025 17:48:19.697945118 CET44550379202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:19.697958946 CET44550379202.206.173.1192.168.2.6
                                    Jan 15, 2025 17:48:19.758027077 CET50503445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:19.762996912 CET44550503202.206.173.2192.168.2.6
                                    Jan 15, 2025 17:48:19.763108015 CET50503445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:19.763151884 CET50503445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:19.763437033 CET50504445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:19.768330097 CET44550503202.206.173.2192.168.2.6
                                    Jan 15, 2025 17:48:19.768414021 CET50503445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:19.768507004 CET44550504202.206.173.2192.168.2.6
                                    Jan 15, 2025 17:48:19.768577099 CET50504445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:19.768724918 CET50504445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:19.773588896 CET44550504202.206.173.2192.168.2.6
                                    Jan 15, 2025 17:48:19.819560051 CET50507445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:19.824615955 CET4455050772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:19.824754000 CET50507445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:19.824831963 CET50507445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:19.829715014 CET4455050772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:19.990411043 CET4455030014.222.195.1192.168.2.6
                                    Jan 15, 2025 17:48:19.990485907 CET50300445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:48:19.990523100 CET50300445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:48:19.990545988 CET50300445192.168.2.614.222.195.1
                                    Jan 15, 2025 17:48:19.995589018 CET4455030014.222.195.1192.168.2.6
                                    Jan 15, 2025 17:48:19.995743990 CET4455030014.222.195.1192.168.2.6
                                    Jan 15, 2025 17:48:20.053738117 CET50517445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:20.058808088 CET4455051714.222.195.2192.168.2.6
                                    Jan 15, 2025 17:48:20.058898926 CET50517445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:20.058985949 CET50517445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:20.059355974 CET50518445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:20.064093113 CET4455051714.222.195.2192.168.2.6
                                    Jan 15, 2025 17:48:20.064176083 CET50517445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:20.064433098 CET4455051814.222.195.2192.168.2.6
                                    Jan 15, 2025 17:48:20.064512014 CET50518445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:20.064558029 CET50518445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:20.069406986 CET4455051814.222.195.2192.168.2.6
                                    Jan 15, 2025 17:48:20.335052013 CET50532445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:48:20.340106010 CET44550532146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:48:20.340245962 CET50532445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:48:20.340307951 CET50532445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:48:20.345243931 CET44550532146.245.78.1192.168.2.6
                                    Jan 15, 2025 17:48:20.547025919 CET4455030524.191.188.1192.168.2.6
                                    Jan 15, 2025 17:48:20.547102928 CET50305445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:48:20.547149897 CET50305445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:48:20.547172070 CET50305445192.168.2.624.191.188.1
                                    Jan 15, 2025 17:48:20.552078009 CET4455030524.191.188.1192.168.2.6
                                    Jan 15, 2025 17:48:20.552092075 CET4455030524.191.188.1192.168.2.6
                                    Jan 15, 2025 17:48:21.147351980 CET50592445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:48:21.152426958 CET4455059295.128.26.2192.168.2.6
                                    Jan 15, 2025 17:48:21.152693033 CET50592445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:48:21.152693033 CET50592445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:48:21.157598019 CET4455059295.128.26.2192.168.2.6
                                    Jan 15, 2025 17:48:21.301187038 CET4455050772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:21.301326036 CET50507445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:21.301373959 CET50507445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:21.301373959 CET50507445192.168.2.672.37.75.3
                                    Jan 15, 2025 17:48:21.306257010 CET4455050772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:21.306276083 CET4455050772.37.75.3192.168.2.6
                                    Jan 15, 2025 17:48:21.366352081 CET50620445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:21.371403933 CET4455062072.37.75.4192.168.2.6
                                    Jan 15, 2025 17:48:21.371561050 CET50620445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:21.371604919 CET50620445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:21.371880054 CET50622445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:21.376646996 CET4455062272.37.75.4192.168.2.6
                                    Jan 15, 2025 17:48:21.376725912 CET50622445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:21.376755953 CET50622445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:21.376801014 CET4455062072.37.75.4192.168.2.6
                                    Jan 15, 2025 17:48:21.376848936 CET50620445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:21.381505013 CET4455062272.37.75.4192.168.2.6
                                    Jan 15, 2025 17:48:21.672564983 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:21.672605991 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:21.672667027 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:21.673243046 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:21.673255920 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:21.969082117 CET44550317195.128.239.1192.168.2.6
                                    Jan 15, 2025 17:48:21.969146967 CET50317445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:21.984689951 CET44550318206.65.90.1192.168.2.6
                                    Jan 15, 2025 17:48:21.984761953 CET50318445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:48:22.517514944 CET50337445192.168.2.616.50.237.2
                                    Jan 15, 2025 17:48:22.517554045 CET50393445192.168.2.620.66.242.2
                                    Jan 15, 2025 17:48:22.517642021 CET50371445192.168.2.6219.105.215.2
                                    Jan 15, 2025 17:48:22.517649889 CET50347445192.168.2.619.64.25.2
                                    Jan 15, 2025 17:48:22.517678976 CET50357445192.168.2.623.60.133.2
                                    Jan 15, 2025 17:48:22.517752886 CET50317445192.168.2.6195.128.239.1
                                    Jan 15, 2025 17:48:22.517782927 CET50318445192.168.2.6206.65.90.1
                                    Jan 15, 2025 17:48:22.517797947 CET50330445192.168.2.635.145.151.1
                                    Jan 15, 2025 17:48:22.517821074 CET50340445192.168.2.660.58.95.1
                                    Jan 15, 2025 17:48:22.517849922 CET50341445192.168.2.6105.213.27.1
                                    Jan 15, 2025 17:48:22.517899990 CET50345445192.168.2.642.199.188.1
                                    Jan 15, 2025 17:48:22.517904997 CET50350445192.168.2.679.11.33.1
                                    Jan 15, 2025 17:48:22.517921925 CET50351445192.168.2.6152.164.46.1
                                    Jan 15, 2025 17:48:22.517950058 CET50354445192.168.2.647.217.208.1
                                    Jan 15, 2025 17:48:22.517977953 CET50360445192.168.2.6154.92.211.1
                                    Jan 15, 2025 17:48:22.518074989 CET50361445192.168.2.6145.229.6.1
                                    Jan 15, 2025 17:48:22.518094063 CET50364445192.168.2.6182.30.213.1
                                    Jan 15, 2025 17:48:22.518122911 CET50382445192.168.2.6198.0.119.1
                                    Jan 15, 2025 17:48:22.518150091 CET50373445192.168.2.6191.230.113.1
                                    Jan 15, 2025 17:48:22.518191099 CET50378445192.168.2.6146.131.129.2
                                    Jan 15, 2025 17:48:22.518317938 CET50427445192.168.2.6103.73.95.1
                                    Jan 15, 2025 17:48:22.518338919 CET50417445192.168.2.6123.192.157.2
                                    Jan 15, 2025 17:48:22.518371105 CET50452445192.168.2.640.1.60.2
                                    Jan 15, 2025 17:48:22.518400908 CET50447445192.168.2.6179.112.165.2
                                    Jan 15, 2025 17:48:22.518435001 CET50468445192.168.2.6143.125.156.1
                                    Jan 15, 2025 17:48:22.518486023 CET50532445192.168.2.6146.245.78.1
                                    Jan 15, 2025 17:48:22.518559933 CET50504445192.168.2.6202.206.173.2
                                    Jan 15, 2025 17:48:22.518606901 CET50518445192.168.2.614.222.195.2
                                    Jan 15, 2025 17:48:22.519099951 CET50592445192.168.2.695.128.26.2
                                    Jan 15, 2025 17:48:22.519372940 CET50622445192.168.2.672.37.75.4
                                    Jan 15, 2025 17:48:22.704164982 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:22.704294920 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:22.706227064 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:22.706244946 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:22.706480980 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:22.708326101 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:22.708405018 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:22.708410025 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:22.708548069 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:22.751332045 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:22.880968094 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:22.881050110 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:22.881167889 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:22.881366014 CET50640443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:22.881382942 CET4435064040.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:47.272759914 CET49703443192.168.2.640.126.32.68
                                    Jan 15, 2025 17:48:47.272762060 CET4970680192.168.2.62.23.77.188
                                    Jan 15, 2025 17:48:47.277838945 CET4434970340.126.32.68192.168.2.6
                                    Jan 15, 2025 17:48:47.277921915 CET49703443192.168.2.640.126.32.68
                                    Jan 15, 2025 17:48:47.278393030 CET80497062.23.77.188192.168.2.6
                                    Jan 15, 2025 17:48:47.278450966 CET4970680192.168.2.62.23.77.188
                                    Jan 15, 2025 17:48:49.787925005 CET49707443192.168.2.640.126.32.68
                                    Jan 15, 2025 17:48:49.792989016 CET4434970740.126.32.68192.168.2.6
                                    Jan 15, 2025 17:48:49.793056011 CET49707443192.168.2.640.126.32.68
                                    Jan 15, 2025 17:48:53.320312023 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:53.320420980 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:53.320513964 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:53.321134090 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:53.321163893 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.140495062 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.140610933 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:54.144629955 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:54.144659042 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.144891977 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.146739960 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:54.146809101 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:54.146821022 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.146938086 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:54.187335968 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.321105003 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.321167946 CET4435064240.115.3.253192.168.2.6
                                    Jan 15, 2025 17:48:54.321254015 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:54.321482897 CET50642443192.168.2.640.115.3.253
                                    Jan 15, 2025 17:48:54.321518898 CET4435064240.115.3.253192.168.2.6
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 15, 2025 17:47:15.024089098 CET5399953192.168.2.61.1.1.1
                                    Jan 15, 2025 17:47:15.325926065 CET53539991.1.1.1192.168.2.6
                                    Jan 15, 2025 17:47:15.996242046 CET6366553192.168.2.61.1.1.1
                                    Jan 15, 2025 17:47:16.331825972 CET53636651.1.1.1192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 15, 2025 17:47:15.024089098 CET192.168.2.61.1.1.10x1bc7Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                    Jan 15, 2025 17:47:15.996242046 CET192.168.2.61.1.1.10x41c6Standard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 15, 2025 17:47:15.325926065 CET1.1.1.1192.168.2.60x1bc7No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                    Jan 15, 2025 17:47:16.331825972 CET1.1.1.1192.168.2.60x41c6No error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 15, 2025 17:47:16.331825972 CET1.1.1.1192.168.2.60x41c6No error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                    • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.649710103.224.212.215805772C:\Windows\mssecsvr.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 17:47:15.337708950 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 17:47:15.943342924 CET365INHTTP/1.1 302 Found
                                    date: Wed, 15 Jan 2025 16:47:15 GMT
                                    server: Apache
                                    set-cookie: __tad=1736959635.6911048; expires=Sat, 13-Jan-2035 16:47:15 GMT; Max-Age=315360000
                                    location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-1541-9f57-da56839b827f
                                    content-length: 2
                                    content-type: text/html; charset=UTF-8
                                    connection: close
                                    Data Raw: 0a 0a
                                    Data Ascii:


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.649711199.59.243.228805772C:\Windows\mssecsvr.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 17:47:16.337951899 CET169OUTGET /?subid1=20250116-0347-1541-9f57-da56839b827f HTTP/1.1
                                    Cache-Control: no-cache
                                    Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    Connection: Keep-Alive
                                    Jan 15, 2025 17:47:16.806006908 CET1236INHTTP/1.1 200 OK
                                    date: Wed, 15 Jan 2025 16:47:15 GMT
                                    content-type: text/html; charset=utf-8
                                    content-length: 1262
                                    x-request-id: ebac6318-2a75-4752-ba46-19550119d49c
                                    cache-control: no-store, max-age=0
                                    accept-ch: sec-ch-prefers-color-scheme
                                    critical-ch: sec-ch-prefers-color-scheme
                                    vary: sec-ch-prefers-color-scheme
                                    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_td0b0H59UvtNQd+m2a96W9DruNQNfwYskOTFienPN9gZAzbrDa8cL+fd5P7kevif3pgwM6fZI5dbx46lCGgXyQ==
                                    set-cookie: parking_session=ebac6318-2a75-4752-ba46-19550119d49c; expires=Wed, 15 Jan 2025 17:02:16 GMT; path=/
                                    Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 74 64 30 62 30 48 35 39 55 76 74 4e 51 64 2b 6d 32 61 39 36 57 39 44 72 75 4e 51 4e 66 77 59 73 6b 4f 54 46 69 65 6e 50 4e 39 67 5a 41 7a 62 72 44 61 38 63 4c 2b 66 64 35 50 37 6b 65 76 69 66 33 70 67 77 4d 36 66 5a 49 35 64 62 78 34 36 6c 43 47 67 58 79 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                    Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_td0b0H59UvtNQd+m2a96W9DruNQNfwYskOTFienPN9gZAzbrDa8cL+fd5P7kevif3pgwM6fZI5dbx46lCGgXyQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                    Jan 15, 2025 17:47:16.806030035 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                    Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZWJhYzYzMTgtMmE3NS00NzUyLWJhNDYtMTk1NTAxMTlkNDljIiwicGFnZV90aW1lIjoxNzM2OTU5NjM2LCJwYWdlX3VybCI6I


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.649712103.224.212.215803196C:\Windows\mssecsvr.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 17:47:16.945595980 CET100OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    Cache-Control: no-cache
                                    Jan 15, 2025 17:47:17.538379908 CET365INHTTP/1.1 302 Found
                                    date: Wed, 15 Jan 2025 16:47:17 GMT
                                    server: Apache
                                    set-cookie: __tad=1736959637.2702927; expires=Sat, 13-Jan-2035 16:47:17 GMT; Max-Age=315360000
                                    location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc12
                                    content-length: 2
                                    content-type: text/html; charset=UTF-8
                                    connection: close
                                    Data Raw: 0a 0a
                                    Data Ascii:


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.649713103.224.212.215805916C:\Windows\mssecsvr.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 17:47:17.380068064 CET134OUTGET / HTTP/1.1
                                    Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    Cache-Control: no-cache
                                    Cookie: __tad=1736959635.6911048
                                    Jan 15, 2025 17:47:17.990780115 CET269INHTTP/1.1 302 Found
                                    date: Wed, 15 Jan 2025 16:47:17 GMT
                                    server: Apache
                                    location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0347-17ae-b188-3b0abf488c58
                                    content-length: 2
                                    content-type: text/html; charset=UTF-8
                                    connection: close
                                    Data Raw: 0a 0a
                                    Data Ascii:


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.649714199.59.243.228803196C:\Windows\mssecsvr.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 17:47:17.550451040 CET169OUTGET /?subid1=20250116-0347-17ab-9aa2-62d8b5f7fc12 HTTP/1.1
                                    Cache-Control: no-cache
                                    Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    Connection: Keep-Alive
                                    Jan 15, 2025 17:47:18.025686026 CET1236INHTTP/1.1 200 OK
                                    date: Wed, 15 Jan 2025 16:47:17 GMT
                                    content-type: text/html; charset=utf-8
                                    content-length: 1262
                                    x-request-id: c4e03165-c9b3-461f-b141-92b13ec9da6a
                                    cache-control: no-store, max-age=0
                                    accept-ch: sec-ch-prefers-color-scheme
                                    critical-ch: sec-ch-prefers-color-scheme
                                    vary: sec-ch-prefers-color-scheme
                                    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_x/joTDiJU1RWsEnnA9pWKTaA3Nuf6GB8NMHNTj4yoJcv434H89fCWR+1ISiES4Of2GCaNKskZ2eoU9E95QXczQ==
                                    set-cookie: parking_session=c4e03165-c9b3-461f-b141-92b13ec9da6a; expires=Wed, 15 Jan 2025 17:02:17 GMT; path=/
                                    Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 78 2f 6a 6f 54 44 69 4a 55 31 52 57 73 45 6e 6e 41 39 70 57 4b 54 61 41 33 4e 75 66 36 47 42 38 4e 4d 48 4e 54 6a 34 79 6f 4a 63 76 34 33 34 48 38 39 66 43 57 52 2b 31 49 53 69 45 53 34 4f 66 32 47 43 61 4e 4b 73 6b 5a 32 65 6f 55 39 45 39 35 51 58 63 7a 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                    Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_x/joTDiJU1RWsEnnA9pWKTaA3Nuf6GB8NMHNTj4yoJcv434H89fCWR+1ISiES4Of2GCaNKskZ2eoU9E95QXczQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                    Jan 15, 2025 17:47:18.025705099 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                    Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYzRlMDMxNjUtYzliMy00NjFmLWIxNDEtOTJiMTNlYzlkYTZhIiwicGFnZV90aW1lIjoxNzM2OTU5NjM3LCJwYWdlX3VybCI6I


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.649715199.59.243.228805916C:\Windows\mssecsvr.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 15, 2025 17:47:18.000174046 CET231OUTGET /?subid1=20250116-0347-17ae-b188-3b0abf488c58 HTTP/1.1
                                    Cache-Control: no-cache
                                    Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                    Connection: Keep-Alive
                                    Cookie: parking_session=ebac6318-2a75-4752-ba46-19550119d49c
                                    Jan 15, 2025 17:47:18.495793104 CET1236INHTTP/1.1 200 OK
                                    date: Wed, 15 Jan 2025 16:47:17 GMT
                                    content-type: text/html; charset=utf-8
                                    content-length: 1262
                                    x-request-id: 6cd797e7-6913-4439-bdae-17b826e4c36c
                                    cache-control: no-store, max-age=0
                                    accept-ch: sec-ch-prefers-color-scheme
                                    critical-ch: sec-ch-prefers-color-scheme
                                    vary: sec-ch-prefers-color-scheme
                                    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_bVf0DmDWfxOC6+mMIzBEThtrxmmDKW7Ot1g3iY2O/qPwjWiLHiNVJiPdMNJcj3JX4TwNf9+cZtz3n3vgk5x3pA==
                                    set-cookie: parking_session=ebac6318-2a75-4752-ba46-19550119d49c; expires=Wed, 15 Jan 2025 17:02:18 GMT
                                    Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 62 56 66 30 44 6d 44 57 66 78 4f 43 36 2b 6d 4d 49 7a 42 45 54 68 74 72 78 6d 6d 44 4b 57 37 4f 74 31 67 33 69 59 32 4f 2f 71 50 77 6a 57 69 4c 48 69 4e 56 4a 69 50 64 4d 4e 4a 63 6a 33 4a 58 34 54 77 4e 66 39 2b 63 5a 74 7a 33 6e 33 76 67 6b 35 78 33 70 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                    Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_bVf0DmDWfxOC6+mMIzBEThtrxmmDKW7Ot1g3iY2O/qPwjWiLHiNVJiPdMNJcj3JX4TwNf9+cZtz3n3vgk5x3pA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                    Jan 15, 2025 17:47:18.495830059 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                    Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZWJhYzYzMTgtMmE3NS00NzUyLWJhNDYtMTk1NTAxMTlkNDljIiwicGFnZV90aW1lIjoxNzM2OTU5NjM4LCJwYWdlX3VybCI6Imh0dHA6L


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    0192.168.2.64970940.115.3.253443
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 16:47:14 UTC70OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 34 0d 0a 4d 53 2d 43 56 3a 20 37 56 39 53 73 37 65 4a 43 30 79 37 5a 55 30 58 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 65 39 65 30 35 66 63 64 66 35 30 36 38 33 0d 0a 0d 0a
                                    Data Ascii: CNT 1 CON 304MS-CV: 7V9Ss7eJC0y7ZU0X.1Context: 7e9e05fcdf50683
                                    2025-01-15 16:47:14 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                    Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                    2025-01-15 16:47:14 UTC1083OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 30 0d 0a 4d 53 2d 43 56 3a 20 37 56 39 53 73 37 65 4a 43 30 79 37 5a 55 30 58 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 65 39 65 30 35 66 63 64 66 35 30 36 38 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 65 6a 6b 4c 74 76 5a 38 41 57 79 77 55 73 48 66 76 62 45 73 78 7a 6b 54 49 31 65 7a 45 4f 34 48 51 59 61 4a 46 79 7a 77 44 4f 6c 55 55 4f 5a 77 66 42 75 74 71 39 47 48 31 34 7a 6f 32 66 31 65 73 6e 4a 45 70 4c 59 4e 48 33 51 70 49 67 67 36 31 43 37 50 43 6a 50 6d 39 42 76 46 71 76 6e 6d 37 44 30 51 4e 33 6f 37 54 33 48 36 6f 47
                                    Data Ascii: ATH 2 CON\DEVICE 1060MS-CV: 7V9Ss7eJC0y7ZU0X.2Context: 7e9e05fcdf50683<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAejkLtvZ8AWywUsHfvbEsxzkTI1ezEO4HQYaJFyzwDOlUUOZwfButq9GH14zo2f1esnJEpLYNH3QpIgg61C7PCjPm9BvFqvnm7D0QN3o7T3H6oG
                                    2025-01-15 16:47:14 UTC217OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 36 0d 0a 4d 53 2d 43 56 3a 20 37 56 39 53 73 37 65 4a 43 30 79 37 5a 55 30 58 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 37 65 39 65 30 35 66 63 64 66 35 30 36 38 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                    Data Ascii: BND 3 CON\WNS 0 196MS-CV: 7V9Ss7eJC0y7ZU0X.3Context: 7e9e05fcdf50683<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                    2025-01-15 16:47:15 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                    Data Ascii: 202 1 CON 58
                                    2025-01-15 16:47:15 UTC58INData Raw: 4d 53 2d 43 56 3a 20 71 56 74 46 2f 79 2f 49 73 6b 53 77 52 6e 6b 72 69 76 6c 66 4a 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                    Data Ascii: MS-CV: qVtF/y/IskSwRnkrivlfJg.0Payload parsing failed.


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    1192.168.2.64978240.115.3.253443
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 16:47:22 UTC70OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 34 0d 0a 4d 53 2d 43 56 3a 20 6b 43 72 68 4d 49 39 6d 49 55 65 39 45 39 36 49 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 30 38 63 64 32 61 63 61 35 36 30 31 62 63 0d 0a 0d 0a
                                    Data Ascii: CNT 1 CON 304MS-CV: kCrhMI9mIUe9E96I.1Context: c08cd2aca5601bc
                                    2025-01-15 16:47:22 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                    Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                    2025-01-15 16:47:22 UTC1083OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 30 0d 0a 4d 53 2d 43 56 3a 20 6b 43 72 68 4d 49 39 6d 49 55 65 39 45 39 36 49 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 30 38 63 64 32 61 63 61 35 36 30 31 62 63 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 65 6a 6b 4c 74 76 5a 38 41 57 79 77 55 73 48 66 76 62 45 73 78 7a 6b 54 49 31 65 7a 45 4f 34 48 51 59 61 4a 46 79 7a 77 44 4f 6c 55 55 4f 5a 77 66 42 75 74 71 39 47 48 31 34 7a 6f 32 66 31 65 73 6e 4a 45 70 4c 59 4e 48 33 51 70 49 67 67 36 31 43 37 50 43 6a 50 6d 39 42 76 46 71 76 6e 6d 37 44 30 51 4e 33 6f 37 54 33 48 36 6f 47
                                    Data Ascii: ATH 2 CON\DEVICE 1060MS-CV: kCrhMI9mIUe9E96I.2Context: c08cd2aca5601bc<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAejkLtvZ8AWywUsHfvbEsxzkTI1ezEO4HQYaJFyzwDOlUUOZwfButq9GH14zo2f1esnJEpLYNH3QpIgg61C7PCjPm9BvFqvnm7D0QN3o7T3H6oG
                                    2025-01-15 16:47:22 UTC217OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 36 0d 0a 4d 53 2d 43 56 3a 20 6b 43 72 68 4d 49 39 6d 49 55 65 39 45 39 36 49 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 30 38 63 64 32 61 63 61 35 36 30 31 62 63 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                    Data Ascii: BND 3 CON\WNS 0 196MS-CV: kCrhMI9mIUe9E96I.3Context: c08cd2aca5601bc<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                    2025-01-15 16:47:23 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                    Data Ascii: 202 1 CON 58
                                    2025-01-15 16:47:23 UTC58INData Raw: 4d 53 2d 43 56 3a 20 62 59 5a 42 6c 32 53 35 42 45 75 30 62 43 46 74 6f 39 43 46 63 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                    Data Ascii: MS-CV: bYZBl2S5BEu0bCFto9CFcw.0Payload parsing failed.


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    2192.168.2.65002040.115.3.253443
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 16:47:35 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6a 64 2f 67 37 4a 35 33 2f 6b 57 74 63 58 65 38 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 38 30 34 61 30 63 63 32 38 34 32 65 31 34 32 0d 0a 0d 0a
                                    Data Ascii: CNT 1 CON 305MS-CV: jd/g7J53/kWtcXe8.1Context: d804a0cc2842e142
                                    2025-01-15 16:47:35 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                    Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                    2025-01-15 16:47:35 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6a 64 2f 67 37 4a 35 33 2f 6b 57 74 63 58 65 38 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 38 30 34 61 30 63 63 32 38 34 32 65 31 34 32 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 65 6a 6b 4c 74 76 5a 38 41 57 79 77 55 73 48 66 76 62 45 73 78 7a 6b 54 49 31 65 7a 45 4f 34 48 51 59 61 4a 46 79 7a 77 44 4f 6c 55 55 4f 5a 77 66 42 75 74 71 39 47 48 31 34 7a 6f 32 66 31 65 73 6e 4a 45 70 4c 59 4e 48 33 51 70 49 67 67 36 31 43 37 50 43 6a 50 6d 39 42 76 46 71 76 6e 6d 37 44 30 51 4e 33 6f 37 54 33 48 36 6f
                                    Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: jd/g7J53/kWtcXe8.2Context: d804a0cc2842e142<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAejkLtvZ8AWywUsHfvbEsxzkTI1ezEO4HQYaJFyzwDOlUUOZwfButq9GH14zo2f1esnJEpLYNH3QpIgg61C7PCjPm9BvFqvnm7D0QN3o7T3H6o
                                    2025-01-15 16:47:35 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6a 64 2f 67 37 4a 35 33 2f 6b 57 74 63 58 65 38 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 38 30 34 61 30 63 63 32 38 34 32 65 31 34 32 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                    Data Ascii: BND 3 CON\WNS 0 197MS-CV: jd/g7J53/kWtcXe8.3Context: d804a0cc2842e142<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                    2025-01-15 16:47:35 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                    Data Ascii: 202 1 CON 58
                                    2025-01-15 16:47:35 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6b 70 48 30 76 34 4f 32 62 30 69 54 64 55 72 46 7a 74 47 35 46 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                    Data Ascii: MS-CV: kpH0v4O2b0iTdUrFztG5Fw.0Payload parsing failed.


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    3192.168.2.65026340.115.3.253443
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 16:47:55 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 35 78 4f 4f 65 37 42 4b 54 30 4f 36 33 62 78 32 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 34 64 39 64 62 64 34 65 61 37 64 63 34 63 33 0d 0a 0d 0a
                                    Data Ascii: CNT 1 CON 305MS-CV: 5xOOe7BKT0O63bx2.1Context: 64d9dbd4ea7dc4c3
                                    2025-01-15 16:47:55 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                    Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                    2025-01-15 16:47:55 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 35 78 4f 4f 65 37 42 4b 54 30 4f 36 33 62 78 32 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 34 64 39 64 62 64 34 65 61 37 64 63 34 63 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 65 6a 6b 4c 74 76 5a 38 41 57 79 77 55 73 48 66 76 62 45 73 78 7a 6b 54 49 31 65 7a 45 4f 34 48 51 59 61 4a 46 79 7a 77 44 4f 6c 55 55 4f 5a 77 66 42 75 74 71 39 47 48 31 34 7a 6f 32 66 31 65 73 6e 4a 45 70 4c 59 4e 48 33 51 70 49 67 67 36 31 43 37 50 43 6a 50 6d 39 42 76 46 71 76 6e 6d 37 44 30 51 4e 33 6f 37 54 33 48 36 6f
                                    Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 5xOOe7BKT0O63bx2.2Context: 64d9dbd4ea7dc4c3<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAejkLtvZ8AWywUsHfvbEsxzkTI1ezEO4HQYaJFyzwDOlUUOZwfButq9GH14zo2f1esnJEpLYNH3QpIgg61C7PCjPm9BvFqvnm7D0QN3o7T3H6o
                                    2025-01-15 16:47:55 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 35 78 4f 4f 65 37 42 4b 54 30 4f 36 33 62 78 32 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 34 64 39 64 62 64 34 65 61 37 64 63 34 63 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                    Data Ascii: BND 3 CON\WNS 0 197MS-CV: 5xOOe7BKT0O63bx2.3Context: 64d9dbd4ea7dc4c3<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                    2025-01-15 16:47:55 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                    Data Ascii: 202 1 CON 58
                                    2025-01-15 16:47:55 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6a 62 38 46 77 63 54 37 56 45 32 30 7a 6e 56 57 73 79 4e 7a 44 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                    Data Ascii: MS-CV: jb8FwcT7VE20znVWsyNzDg.0Payload parsing failed.


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    4192.168.2.65064040.115.3.253443
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 16:48:22 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 42 43 4b 56 64 75 65 70 65 45 36 77 44 56 69 44 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 63 32 39 63 34 39 37 64 31 38 64 39 62 31 33 0d 0a 0d 0a
                                    Data Ascii: CNT 1 CON 305MS-CV: BCKVduepeE6wDViD.1Context: ec29c497d18d9b13
                                    2025-01-15 16:48:22 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                    Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                    2025-01-15 16:48:22 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 42 43 4b 56 64 75 65 70 65 45 36 77 44 56 69 44 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 63 32 39 63 34 39 37 64 31 38 64 39 62 31 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 65 6a 6b 4c 74 76 5a 38 41 57 79 77 55 73 48 66 76 62 45 73 78 7a 6b 54 49 31 65 7a 45 4f 34 48 51 59 61 4a 46 79 7a 77 44 4f 6c 55 55 4f 5a 77 66 42 75 74 71 39 47 48 31 34 7a 6f 32 66 31 65 73 6e 4a 45 70 4c 59 4e 48 33 51 70 49 67 67 36 31 43 37 50 43 6a 50 6d 39 42 76 46 71 76 6e 6d 37 44 30 51 4e 33 6f 37 54 33 48 36 6f
                                    Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: BCKVduepeE6wDViD.2Context: ec29c497d18d9b13<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAejkLtvZ8AWywUsHfvbEsxzkTI1ezEO4HQYaJFyzwDOlUUOZwfButq9GH14zo2f1esnJEpLYNH3QpIgg61C7PCjPm9BvFqvnm7D0QN3o7T3H6o
                                    2025-01-15 16:48:22 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 42 43 4b 56 64 75 65 70 65 45 36 77 44 56 69 44 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 63 32 39 63 34 39 37 64 31 38 64 39 62 31 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                    Data Ascii: BND 3 CON\WNS 0 197MS-CV: BCKVduepeE6wDViD.3Context: ec29c497d18d9b13<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                    2025-01-15 16:48:22 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                    Data Ascii: 202 1 CON 58
                                    2025-01-15 16:48:22 UTC58INData Raw: 4d 53 2d 43 56 3a 20 62 67 30 54 44 2b 42 38 43 30 69 38 4d 62 47 4f 6d 74 32 44 47 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                    Data Ascii: MS-CV: bg0TD+B8C0i8MbGOmt2DGg.0Payload parsing failed.


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    5192.168.2.65064240.115.3.253443
                                    TimestampBytes transferredDirectionData
                                    2025-01-15 16:48:54 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 53 61 53 6a 31 51 58 32 76 55 2b 65 7a 79 30 53 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 34 65 35 65 35 65 30 64 64 32 37 65 30 38 33 0d 0a 0d 0a
                                    Data Ascii: CNT 1 CON 305MS-CV: SaSj1QX2vU+ezy0S.1Context: 14e5e5e0dd27e083
                                    2025-01-15 16:48:54 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                    Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                    2025-01-15 16:48:54 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 53 61 53 6a 31 51 58 32 76 55 2b 65 7a 79 30 53 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 34 65 35 65 35 65 30 64 64 32 37 65 30 38 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 65 6a 6b 4c 74 76 5a 38 41 57 79 77 55 73 48 66 76 62 45 73 78 7a 6b 54 49 31 65 7a 45 4f 34 48 51 59 61 4a 46 79 7a 77 44 4f 6c 55 55 4f 5a 77 66 42 75 74 71 39 47 48 31 34 7a 6f 32 66 31 65 73 6e 4a 45 70 4c 59 4e 48 33 51 70 49 67 67 36 31 43 37 50 43 6a 50 6d 39 42 76 46 71 76 6e 6d 37 44 30 51 4e 33 6f 37 54 33 48 36 6f
                                    Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: SaSj1QX2vU+ezy0S.2Context: 14e5e5e0dd27e083<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAejkLtvZ8AWywUsHfvbEsxzkTI1ezEO4HQYaJFyzwDOlUUOZwfButq9GH14zo2f1esnJEpLYNH3QpIgg61C7PCjPm9BvFqvnm7D0QN3o7T3H6o
                                    2025-01-15 16:48:54 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 53 61 53 6a 31 51 58 32 76 55 2b 65 7a 79 30 53 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 34 65 35 65 35 65 30 64 64 32 37 65 30 38 33 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                    Data Ascii: BND 3 CON\WNS 0 197MS-CV: SaSj1QX2vU+ezy0S.3Context: 14e5e5e0dd27e083<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                    2025-01-15 16:48:54 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                    Data Ascii: 202 1 CON 58
                                    2025-01-15 16:48:54 UTC58INData Raw: 4d 53 2d 43 56 3a 20 35 51 72 39 2f 66 35 31 55 30 2b 38 5a 61 43 68 68 36 2b 77 47 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                    Data Ascii: MS-CV: 5Qr9/f51U0+8ZaChh6+wGg.0Payload parsing failed.


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:11:47:12
                                    Start date:15/01/2025
                                    Path:C:\Windows\System32\loaddll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll"
                                    Imagebase:0x4c0000
                                    File size:126'464 bytes
                                    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:1
                                    Start time:11:47:12
                                    Start date:15/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:11:47:13
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1
                                    Imagebase:0x1c0000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:11:47:13
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\f5mfkHLLVe.dll,PlayGame
                                    Imagebase:0x710000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:11:47:13
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",#1
                                    Imagebase:0x710000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:11:47:13
                                    Start date:15/01/2025
                                    Path:C:\Windows\mssecsvr.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvr.exe
                                    Imagebase:0x400000
                                    File size:2'281'472 bytes
                                    MD5 hash:835246CD3690184218773906A49D8328
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2160946796.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2161097186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.2161097186.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:8
                                    Start time:11:47:15
                                    Start date:15/01/2025
                                    Path:C:\Windows\mssecsvr.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                    Imagebase:0x400000
                                    File size:2'281'472 bytes
                                    MD5 hash:835246CD3690184218773906A49D8328
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2185223099.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2185353936.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2185353936.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2834191823.0000000002283000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2834191823.0000000002283000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2833962615.0000000001D5B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2833962615.0000000001D5B000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Target ID:9
                                    Start time:11:47:16
                                    Start date:15/01/2025
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\f5mfkHLLVe.dll",PlayGame
                                    Imagebase:0x710000
                                    File size:61'440 bytes
                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:11:47:16
                                    Start date:15/01/2025
                                    Path:C:\Windows\mssecsvr.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\WINDOWS\mssecsvr.exe
                                    Imagebase:0x400000
                                    File size:2'281'472 bytes
                                    MD5 hash:835246CD3690184218773906A49D8328
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2189366681.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2205428809.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2205701393.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.2205701393.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2189507796.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.2189507796.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:71.7%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:63.2%
                                      Total number of Nodes:38
                                      Total number of Limit Nodes:9
                                      execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F7F0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                      • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                      • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                      • CreateProcessA.KERNELBASE ref: 00407EE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                      • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2197687096.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.2197671383.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197704069.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197758965.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4281112323-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2197687096.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.2197671383.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197704069.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197758965.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2197687096.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.2197671383.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197704069.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197758965.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      • API String ID: 774561529-2614457033
                                      • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                      • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F7F0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2197687096.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.2197671383.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197704069.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197758965.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                      • API String ID: 3340711343-2450984573
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F7F0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2197687096.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000006.00000002.2197671383.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197704069.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197719632.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197758965.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000006.00000002.2197846856.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.1
                                      • API String ID: 4274534310-2839763450
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Execution Graph

                                      Execution Coverage:34.8%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:36
                                      Total number of Limit Nodes:2

                                      Callgraph

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                      • __p___argc.MSVCRT ref: 004080A5
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                      • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F7F0EF0,00000000,?,004081B2), ref: 004080DC
                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                      • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                      • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2832697050.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2832681992.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832783597.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832857933.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832874500.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                      • String ID: mssecsvc2.1
                                      • API String ID: 4274534310-2839763450
                                      • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                      • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                      • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                      Control-flow Graph

                                      APIs
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                      • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                      • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                        • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                        • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                      Strings
                                      • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2832697050.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2832681992.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832783597.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832857933.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832874500.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                      • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                      • API String ID: 774561529-2614457033
                                      • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                      • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                      • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                      Control-flow Graph

                                      APIs
                                      • sprintf.MSVCRT ref: 00407C56
                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                      • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F7F0EF0,00000000), ref: 00407C9B
                                      • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2832697050.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2832681992.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832783597.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832857933.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832874500.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                      • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                      • API String ID: 3340711343-2450984573
                                      • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                      • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                      • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F7F0EF0,?,00000000), ref: 00407CEF
                                      • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                      • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                      • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                      • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                      • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                      • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                      • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                      • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                      • sprintf.MSVCRT ref: 00407E01
                                      • sprintf.MSVCRT ref: 00407E18
                                      • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2832697050.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2832681992.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832783597.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832857933.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832874500.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                      • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                      • API String ID: 4072214828-1507730452
                                      • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                      • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                      • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2832697050.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000008.00000002.2832681992.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832783597.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832800862.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832841318.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832857933.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832874500.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000008.00000002.2832960102.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                      • String ID:
                                      • API String ID: 801014965-0
                                      • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                      • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                      • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59