Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QQE81XYXon.dll

Overview

General Information

Sample name:QQE81XYXon.dll
renamed because original name is a hash value
Original sample name:c4fca61333b642e21c2b1ba417c0100d.dll
Analysis ID:1592107
MD5:c4fca61333b642e21c2b1ba417c0100d
SHA1:5505cce40eeedd3948daf098f1ce95aa5cd1bc42
SHA256:85a6bca0ebd3e1c99d8fd6669a6db6ddd8463b7c7edaa87702ca2a425fc5cce5
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
AI detected suspicious sample
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4900 cmdline: loaddll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4568 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 2820 cmdline: rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1976 cmdline: rundll32.exe C:\Users\user\Desktop\QQE81XYXon.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 4800 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 6BFA175E3CBD626EF26394826EDB0FDF)
    • rundll32.exe (PID: 4836 cmdline: rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 3816 cmdline: C:\WINDOWS\mssecsvr.exe MD5: 6BFA175E3CBD626EF26394826EDB0FDF)
  • mssecsvr.exe (PID: 3748 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: 6BFA175E3CBD626EF26394826EDB0FDF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
QQE81XYXon.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    QQE81XYXon.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    QQE81XYXon.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
      • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
      • 0xf4d8:$x3: tasksche.exe
      • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
      • 0xf52c:$x5: WNcry@2ol7
      • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
      • 0xf42c:$s3: cmd.exe /c "%s"
      • 0x41980:$s4: msg/m_portuguese.wnry
      C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        0000000A.00000002.2196270495.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000000.2152520017.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000008.00000000.2179028546.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                Click to see the 20 entries
                SourceRuleDescriptionAuthorStrings
                8.2.mssecsvr.exe.22778c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                8.2.mssecsvr.exe.1d4d084.2.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                6.2.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xe8d8:$x3: tasksche.exe
                • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xe92c:$x5: WNcry@2ol7
                • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xe82c:$s3: cmd.exe /c "%s"
                6.2.mssecsvr.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                10.0.mssecsvr.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xe8d8:$x3: tasksche.exe
                • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xe92c:$x5: WNcry@2ol7
                • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xe82c:$s3: cmd.exe /c "%s"
                Click to see the 87 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T19:07:06.827382+010028033043Unknown Traffic192.168.2.649710103.224.212.21580TCP
                2025-01-15T19:07:08.395925+010028033043Unknown Traffic192.168.2.649712103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-15T19:07:05.916752+010028300181A Network Trojan was detected192.168.2.6541261.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: QQE81XYXon.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb4Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c3Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831fbAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c39eAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb439Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/pAvira URL Cloud: Label: malware
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 84%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 84%
                Source: QQE81XYXon.dllReversingLabs: Detection: 92%
                Source: QQE81XYXon.dllVirustotal: Detection: 91%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
                Source: QQE81XYXon.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: QQE81XYXon.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49952 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49795 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50018 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50264 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50404 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50635 version: TLS 1.2

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.6:54126 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0507-06c2-ab55-018cebe831fb HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736964426.6027517
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0507-08af-9581-038eeaa6c39e HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0507-0847-82be-09ad5d5cb439 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=667eccaa-c04f-4d79-96f2-58e7887f231d
                Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49712 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49710 -> 103.224.212.215:80
                Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49952 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.241
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.241
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.241
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.1
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.241
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.1
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.1
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.1
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.1
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.1
                Source: unknownTCP traffic detected without corresponding DNS query: 49.114.69.1
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.157
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.157
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.157
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.1
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.1
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.1
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.157
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.1
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.1
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.1
                Source: unknownTCP traffic detected without corresponding DNS query: 158.87.244.1
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.178
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.178
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.178
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.1
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.178
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.1
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.1
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.1
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.1
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.1
                Source: unknownTCP traffic detected without corresponding DNS query: 75.228.122.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0507-06c2-ab55-018cebe831fb HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736964426.6027517
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0507-08af-9581-038eeaa6c39e HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /?subid1=20250116-0507-0847-82be-09ad5d5cb439 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=667eccaa-c04f-4d79-96f2-58e7887f231d
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000BAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000B4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831
                Source: mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb4
                Source: mssecsvr.exe, 00000008.00000002.2826859936.0000000000A1C000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2826859936.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2194899332.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c3
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000BAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/p
                Source: QQE81XYXon.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000008.00000003.2194899332.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&
                Source: mssecsvr.exe, 00000008.00000003.2194899332.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2826859936.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/8
                Source: mssecsvr.exe, 00000008.00000003.2194899332.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2826859936.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/:
                Source: mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/B
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/a
                Source: mssecsvr.exe, 00000008.00000002.2826519484.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000B4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comV1
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50018
                Source: unknownNetwork traffic detected: HTTP traffic on port 50635 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50404
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50635
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
                Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50018 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50264
                Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50264 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50404 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:49795 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50018 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50264 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50404 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:50635 version: TLS 1.2

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: QQE81XYXon.dll, type: SAMPLE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5c104.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d7f128.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22a996c.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d4d084.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22778c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d580a4.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1d5c104.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2196270495.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2152520017.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.2179028546.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.2180935665.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.2179157814.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.2181333198.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.2152654639.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2827299654.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2196435843.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2827534382.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 4800, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 3748, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 3816, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\tasksche.exe, type: DROPPED

                System Summary

                barindex
                Source: QQE81XYXon.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: QQE81XYXon.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22778c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d4d084.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d7f128.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d7f128.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d5c104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d5c104.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.1d5c104.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d7f128.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d7f128.4.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d4d084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d4d084.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d580a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d580a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.1d5c104.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1d5c104.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 8.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000000.2179157814.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000000.2181333198.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000000.2152654639.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2827299654.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 0000000A.00000002.2196435843.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: 00000008.00000002.2827534382.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: tasksche.exe.6.drStatic PE information: No import functions for PE file found
                Source: QQE81XYXon.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: QQE81XYXon.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: QQE81XYXon.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22778c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d4d084.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d7f128.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d7f128.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22a996c.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d5c104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d5c104.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.1d5c104.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.2286948.8.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d7f128.4.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d7f128.4.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22a996c.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d4d084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d4d084.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22778c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2286948.8.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d580a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d580a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.1d5c104.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1d5c104.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 8.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.22828e8.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000000.2179157814.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000000.2181333198.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000000.2152654639.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2827299654.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 0000000A.00000002.2196435843.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: 00000008.00000002.2827534382.0000000002286000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                Source: tasksche.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: tasksche.exe.6.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
                Source: tasksche.exe.6.drStatic PE information: Section: .data ZLIB complexity 1.001953125
                Source: tasksche.exe.6.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
                Source: QQE81XYXon.dll, tasksche.exe.6.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@18/2@2/100
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3380:120:WilError_03
                Source: QQE81XYXon.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\QQE81XYXon.dll,PlayGame
                Source: QQE81XYXon.dllReversingLabs: Detection: 92%
                Source: QQE81XYXon.dllVirustotal: Detection: 91%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\QQE81XYXon.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\QQE81XYXon.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: QQE81XYXon.dllStatic file information: File size 5267459 > 1048576
                Source: QQE81XYXon.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: tasksche.exe.6.drStatic PE information: section name: .text entropy: 7.606657494548842

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exe TID: 5532Thread sleep count: 92 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 5532Thread sleep time: -184000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 1132Thread sleep count: 131 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 1132Thread sleep count: 45 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 5532Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: mssecsvr.exe, 00000008.00000002.2826859936.00000000009F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@T
                Source: mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWE
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000BAC000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2826859936.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2194899332.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000B4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                Source: mssecsvr.exe, 00000006.00000002.2195490388.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWd
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1Jump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Service Execution
                4
                Windows Service
                4
                Windows Service
                12
                Masquerading
                OS Credential Dumping1
                Network Share Discovery
                Remote ServicesData from Local System2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Process Injection
                21
                Virtualization/Sandbox Evasion
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Process Injection
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDS1
                System Information Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592107 Sample: QQE81XYXon.dll Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 34 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->34 36 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->36 38 77026.bodis.com 2->38 46 Suricata IDS alerts for network traffic 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for URL or domain 2->50 52 7 other signatures 2->52 8 loaddll32.exe 1 2->8         started        10 mssecsvr.exe 12 2->10         started        signatures3 process4 dnsIp5 14 rundll32.exe 8->14         started        17 rundll32.exe 8->17         started        19 cmd.exe 1 8->19         started        21 conhost.exe 8->21         started        40 192.168.2.100 unknown unknown 10->40 42 192.168.2.102 unknown unknown 10->42 44 98 other IPs or domains 10->44 54 Connects to many different private IPs via SMB (likely to spread or exploit) 10->54 56 Connects to many different private IPs (likely to spread or exploit) 10->56 signatures6 process7 signatures8 58 Drops executables to the windows directory (C:\Windows) and starts them 14->58 23 mssecsvr.exe 13 14->23         started        26 mssecsvr.exe 13 17->26         started        28 rundll32.exe 1 19->28         started        process9 file10 30 C:\WINDOWS\qeriuwjhrf (copy), PE32 23->30 dropped 32 C:\Windows\tasksche.exe, PE32 26->32 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                QQE81XYXon.dll92%ReversingLabsWin32.Ransomware.WannaCry
                QQE81XYXon.dll91%VirustotalBrowse
                QQE81XYXon.dll100%AviraTR/AD.DPulsarShellcode.gohtr
                QQE81XYXon.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)85%ReversingLabsWin32.Ransomware.WannaCry
                C:\Windows\tasksche.exe85%ReversingLabsWin32.Ransomware.WannaCry
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb4100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comV10%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c3100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831fb100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c39e100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb439100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/p100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                  103.224.212.215
                  truefalse
                    high
                    ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831fbfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c39efalse
                      • Avira URL Cloud: malware
                      unknown
                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb439false
                      • Avira URL Cloud: malware
                      unknown
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c3mssecsvr.exe, 00000008.00000002.2826859936.0000000000A1C000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2826859936.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2194899332.0000000000A4F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comV1mssecsvr.exe, 00000006.00000002.2195490388.0000000000B4E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb4mssecsvr.exe, 0000000A.00000002.2196882708.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/)mssecsvr.exe, 00000008.00000003.2194899332.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2826859936.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A48000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/&mssecsvr.exe, 00000008.00000003.2194899332.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A48000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000006.00000002.2195490388.0000000000BAC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831mssecsvr.exe, 00000006.00000002.2195490388.0000000000B4E000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comQQE81XYXon.dllfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Bmssecsvr.exe, 0000000A.00000002.2196882708.0000000000C28000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/pmssecsvr.exe, 00000006.00000002.2195490388.0000000000BAC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/amssecsvr.exe, 00000006.00000002.2195490388.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/:mssecsvr.exe, 00000008.00000003.2194899332.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2826859936.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000003.2191139653.0000000000A48000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000008.00000002.2826519484.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                        high
                                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/8mssecsvr.exe, 00000006.00000002.2195490388.0000000000B8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          15.8.58.250
                                          unknownUnited States
                                          13979ATT-IPFRUSfalse
                                          49.114.69.2
                                          unknownChina
                                          4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                          49.114.69.1
                                          unknownChina
                                          4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                                          118.54.82.1
                                          unknownKorea Republic of
                                          4766KIXS-AS-KRKoreaTelecomKRfalse
                                          153.143.158.1
                                          unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                          104.205.84.2
                                          unknownCanada
                                          852ASN852CAfalse
                                          7.138.150.1
                                          unknownUnited States
                                          3356LEVEL3USfalse
                                          54.192.5.1
                                          unknownUnited States
                                          14618AMAZON-AESUSfalse
                                          104.205.84.1
                                          unknownCanada
                                          852ASN852CAfalse
                                          153.143.158.197
                                          unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                                          117.41.142.1
                                          unknownChina
                                          4809CHINATELECOM-CORE-WAN-CN2ChinaTelecomNextGenerationCarrfalse
                                          173.218.135.151
                                          unknownUnited States
                                          19108SUDDENLINK-COMMUNICATIONSUSfalse
                                          200.198.81.1
                                          unknownBrazil
                                          15180UOLDIVEOSABRfalse
                                          32.52.139.1
                                          unknownUnited States
                                          7018ATT-INTERNET4USfalse
                                          203.128.199.61
                                          unknownKorea Republic of
                                          17608ABN-AS-KRABNKRfalse
                                          149.241.237.229
                                          unknownUnited Kingdom
                                          5607BSKYB-BROADBAND-ASGBfalse
                                          186.162.98.1
                                          unknownPeru
                                          21575ENTELPERUSAPEfalse
                                          63.35.17.92
                                          unknownUnited States
                                          16509AMAZON-02USfalse
                                          186.162.98.9
                                          unknownPeru
                                          21575ENTELPERUSAPEfalse
                                          IP
                                          192.168.2.148
                                          192.168.2.149
                                          192.168.2.146
                                          192.168.2.147
                                          192.168.2.140
                                          192.168.2.141
                                          192.168.2.144
                                          192.168.2.145
                                          192.168.2.142
                                          192.168.2.143
                                          192.168.2.159
                                          192.168.2.157
                                          192.168.2.158
                                          192.168.2.151
                                          192.168.2.152
                                          192.168.2.150
                                          192.168.2.155
                                          192.168.2.156
                                          192.168.2.153
                                          192.168.2.154
                                          192.168.2.126
                                          192.168.2.247
                                          192.168.2.127
                                          192.168.2.248
                                          192.168.2.124
                                          192.168.2.245
                                          192.168.2.125
                                          192.168.2.246
                                          192.168.2.128
                                          192.168.2.249
                                          192.168.2.129
                                          192.168.2.240
                                          192.168.2.122
                                          192.168.2.243
                                          192.168.2.123
                                          192.168.2.244
                                          192.168.2.120
                                          192.168.2.241
                                          192.168.2.121
                                          192.168.2.242
                                          192.168.2.97
                                          192.168.2.137
                                          192.168.2.96
                                          192.168.2.138
                                          192.168.2.99
                                          192.168.2.135
                                          192.168.2.98
                                          192.168.2.136
                                          192.168.2.139
                                          192.168.2.250
                                          192.168.2.130
                                          192.168.2.251
                                          192.168.2.91
                                          192.168.2.90
                                          192.168.2.93
                                          192.168.2.133
                                          192.168.2.254
                                          192.168.2.92
                                          192.168.2.134
                                          192.168.2.95
                                          192.168.2.131
                                          192.168.2.252
                                          192.168.2.94
                                          192.168.2.132
                                          192.168.2.253
                                          192.168.2.104
                                          192.168.2.225
                                          192.168.2.105
                                          192.168.2.226
                                          192.168.2.102
                                          192.168.2.223
                                          192.168.2.103
                                          192.168.2.224
                                          192.168.2.108
                                          192.168.2.229
                                          192.168.2.109
                                          192.168.2.106
                                          192.168.2.227
                                          192.168.2.107
                                          192.168.2.228
                                          192.168.2.100
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1592107
                                          Start date and time:2025-01-15 19:06:10 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 5m 25s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:15
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:QQE81XYXon.dll
                                          renamed because original name is a hash value
                                          Original Sample Name:c4fca61333b642e21c2b1ba417c0100d.dll
                                          Detection:MAL
                                          Classification:mal100.rans.expl.evad.winDLL@18/2@2/100
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:Failed
                                          Cookbook Comments:
                                          • Found application associated with file extension: .dll
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 2.23.77.188, 217.20.57.36, 217.20.57.35, 13.107.246.45, 20.109.210.53
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          13:07:06API Interceptor1x Sleep call for process: loaddll32.exe modified
                                          13:07:41API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          77026.bodis.comf5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          q4e7rZQEkL.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          Gn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                          • 199.59.243.228
                                          www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comf5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          q4e7rZQEkL.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          Gn8CvJE07O.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          mLm1d1GV4R.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          V01vdyUACe.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          hVgcaX2SV8.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                                          • 103.224.212.215
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ATT-IPFRUS19MgUpI9tj.dllGet hashmaliciousWannacryBrowse
                                          • 15.116.122.57
                                          Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                          • 15.95.97.1
                                          res.ppc.elfGet hashmaliciousUnknownBrowse
                                          • 15.62.240.111
                                          armv5l.elfGet hashmaliciousUnknownBrowse
                                          • 15.6.247.41
                                          miori.mpsl.elfGet hashmaliciousUnknownBrowse
                                          • 15.86.183.116
                                          miori.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 15.94.249.38
                                          armv4l.elfGet hashmaliciousUnknownBrowse
                                          • 15.62.68.27
                                          armv6l.elfGet hashmaliciousUnknownBrowse
                                          • 15.40.35.137
                                          armv7l.elfGet hashmaliciousUnknownBrowse
                                          • 15.8.11.165
                                          armv4l.elfGet hashmaliciousUnknownBrowse
                                          • 15.14.209.211
                                          CHINANET-BACKBONENo31Jin-rongStreetCNImPgtzz6o4.dllGet hashmaliciousWannacryBrowse
                                          • 218.64.246.1
                                          txWVWM8Kx4.dllGet hashmaliciousWannacryBrowse
                                          • 60.171.191.2
                                          ET6LdJaK54.dllGet hashmaliciousWannacryBrowse
                                          • 106.230.138.178
                                          bot.x86.elfGet hashmaliciousUnknownBrowse
                                          • 220.183.55.11
                                          bot.spc.elfGet hashmaliciousUnknownBrowse
                                          • 14.155.77.28
                                          bot.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 120.37.0.150
                                          bot.mips.elfGet hashmaliciousUnknownBrowse
                                          • 114.135.188.251
                                          bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 113.120.26.134
                                          bot.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 202.98.153.102
                                          bot.arm7.elfGet hashmaliciousMiraiBrowse
                                          • 210.185.215.218
                                          CHINANET-BACKBONENo31Jin-rongStreetCNImPgtzz6o4.dllGet hashmaliciousWannacryBrowse
                                          • 218.64.246.1
                                          txWVWM8Kx4.dllGet hashmaliciousWannacryBrowse
                                          • 60.171.191.2
                                          ET6LdJaK54.dllGet hashmaliciousWannacryBrowse
                                          • 106.230.138.178
                                          bot.x86.elfGet hashmaliciousUnknownBrowse
                                          • 220.183.55.11
                                          bot.spc.elfGet hashmaliciousUnknownBrowse
                                          • 14.155.77.28
                                          bot.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 120.37.0.150
                                          bot.mips.elfGet hashmaliciousUnknownBrowse
                                          • 114.135.188.251
                                          bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 113.120.26.134
                                          bot.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 202.98.153.102
                                          bot.arm7.elfGet hashmaliciousMiraiBrowse
                                          • 210.185.215.218
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          1138de370e523e824bbca92d049a3777txWVWM8Kx4.dllGet hashmaliciousWannacryBrowse
                                          • 173.222.162.64
                                          f5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                                          • 173.222.162.64
                                          hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                          • 173.222.162.64
                                          2lX8Z3eydC.dllGet hashmaliciousWannacryBrowse
                                          • 173.222.162.64
                                          ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          Personliche Nachricht fur e4060738.pdfGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          https://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSPT0wVekqsfeOZRSaz9d28itE0eTxOetbwlGaCx05rQJywXo_UNbDpVWBvKTmUslwem1E0EC2Cp68hMzvjQfllUT9E4DZqDf2uiRmAk3QSMceJiv-2FShXGXSXiT9Fl37dFQYscKLxEMcTJj4tm5gMav6Ov9aRXzCg4yzvno75Wb80hSd5kw8Ua5r4R2pwCFTS4zDFYiEkWB-2BYk1VUWtpkJwb9IQIMAq1SSLT005wiJ2XiGw1jPEr6v61MJQRnC7AeLVtxYgqGlydBoPFbs1IP04-2BxPajuRI3fTsnzWZ9ty3RasYpwuqdrF0E8VoyYkggeeLEm9ENK69uYTCVHWHpxCPkzirQSIkvpt5FNZojg491ibS35IgO0LPU5gnpEaeaUj4-2BZoFUHIAAzMMy-2BYqsZ9F9Ldu1c-3D#XGet hashmaliciousHTMLPhisherBrowse
                                          • 173.222.162.64
                                          NLWfV87ouS.dllGet hashmaliciousWannacryBrowse
                                          • 173.222.162.64
                                          330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                                          • 173.222.162.64
                                          https://asalto-bart.eu/o/dcvGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          3b5074b1b5d032e5620f69f9f700ff0enew-riii-1-b.pub.htaGet hashmaliciousLummaCBrowse
                                          • 40.115.3.253
                                          https://login.ecoleterradeasltd.xyz/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725581254870614.NzQzNDkzODMtOTc3Ni00MTk4LWEyOTgtNzcxOTE2NjUxYzRiMGVmZDU5N2MtN2U3NC00YjUwLTkxMzUtNTE5MGUwYzg1ZmQ2&ui_locales=en-US&mkt=en-US&client-request-id=36d4a1f6-7cba-45d1-a3ed-df92000d1eff&state=HfQ7BQGkYjqSuhdp0uw1pmK7OnWuMWuL6CrtRUQFTAqayUvi4HK2WHpRg3qXyBpviEzEkkPrHxRuxUPhbVJ6VT_z1Q4rknsdO1I1G8I0vvmCJKY1Jj17UvvXfl7rwwbByhZiSjZv4e0zjm8vBEwSjLmzdF29N_NteyY8M7drEpkBEAgCB0EoFXswqlG9707goDIQqjTpA0BHvdohyO5aj-tJFO1J-Wz2owkKr6bkCNZlxKE53oI2XKYpyD1GEC2x5jHgmT1f4Yrr9BPkhEeMCw&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0Get hashmaliciousUnknownBrowse
                                          • 40.115.3.253
                                          random.exeGet hashmaliciousLiteHTTP BotBrowse
                                          • 40.115.3.253
                                          f5mfkHLLVe.dllGet hashmaliciousWannacryBrowse
                                          • 40.115.3.253
                                          hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                                          • 40.115.3.253
                                          lummm_lzmb.exeGet hashmaliciousLummaCBrowse
                                          • 40.115.3.253
                                          2lX8Z3eydC.dllGet hashmaliciousWannacryBrowse
                                          • 40.115.3.253
                                          aASfOObWpW.exeGet hashmaliciousUnknownBrowse
                                          • 40.115.3.253
                                          aASfOObWpW.exeGet hashmaliciousUnknownBrowse
                                          • 40.115.3.253
                                          No context
                                          Process:C:\Windows\mssecsvr.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2061938
                                          Entropy (8bit):7.991401003557254
                                          Encrypted:true
                                          SSDEEP:49152:hqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvm:hqPoBhz1aRxcSUDk36SAEdhvm
                                          MD5:03F2EC5030D15A6C8AF50F8F43413938
                                          SHA1:E2446007234549AEA1435B44B44FA6E14FA90E15
                                          SHA-256:F61248DB0A47C5A3E87FA5F60BF70AFF0DFC751235D6E83B50D0DDB0575A4F77
                                          SHA-512:4A2C7E165903F035C61AE5433541FC70E8ADEBAF67B2356DB2C3A0C89D8A4C2CE0682A1F6AD60FAB49F4547E391DBDB6C9B133A881698BD20398DD19B2F3E01B
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 85%
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\mssecsvr.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2061938
                                          Entropy (8bit):7.991401003557254
                                          Encrypted:true
                                          SSDEEP:49152:hqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvm:hqPoBhz1aRxcSUDk36SAEdhvm
                                          MD5:03F2EC5030D15A6C8AF50F8F43413938
                                          SHA1:E2446007234549AEA1435B44B44FA6E14FA90E15
                                          SHA-256:F61248DB0A47C5A3E87FA5F60BF70AFF0DFC751235D6E83B50D0DDB0575A4F77
                                          SHA-512:4A2C7E165903F035C61AE5433541FC70E8ADEBAF67B2356DB2C3A0C89D8A4C2CE0682A1F6AD60FAB49F4547E391DBDB6C9B133A881698BD20398DD19B2F3E01B
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: C:\Windows\tasksche.exe, Author: Joe Security
                                          • Rule: WannaCry_Ransomware, Description: Detects WannaCry Ransomware, Source: C:\Windows\tasksche.exe, Author: Florian Roth (with the help of binar.ly)
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: C:\Windows\tasksche.exe, Author: us-cert code analysis team
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 85%
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):4.322609980325374
                                          TrID:
                                          • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                          • Generic Win/DOS Executable (2004/3) 0.20%
                                          • DOS Executable Generic (2002/1) 0.20%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:QQE81XYXon.dll
                                          File size:5'267'459 bytes
                                          MD5:c4fca61333b642e21c2b1ba417c0100d
                                          SHA1:5505cce40eeedd3948daf098f1ce95aa5cd1bc42
                                          SHA256:85a6bca0ebd3e1c99d8fd6669a6db6ddd8463b7c7edaa87702ca2a425fc5cce5
                                          SHA512:ea4138d3ce34d72fbfe522237e22a70cf724a6028d311f54540b0a4f8a2e1dc21b0245c156f67777d9b7878009e09b80b41338d20e8ac5a0cb0e91927b98a023
                                          SSDEEP:49152:RnHqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:1HqPoBhz1aRxcSUDk36SAEdhv
                                          TLSH:E3363399717C91FCD10519B444ABCA63B2B23C6E26FE6E0F9F4049761C43B5AFB90B42
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                          Icon Hash:7ae282899bbab082
                                          Entrypoint:0x100011e9
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x10000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                          DLL Characteristics:
                                          Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          push ebx
                                          mov ebx, dword ptr [ebp+08h]
                                          push esi
                                          mov esi, dword ptr [ebp+0Ch]
                                          push edi
                                          mov edi, dword ptr [ebp+10h]
                                          test esi, esi
                                          jne 00007FC0F4E4E22Bh
                                          cmp dword ptr [10003140h], 00000000h
                                          jmp 00007FC0F4E4E248h
                                          cmp esi, 01h
                                          je 00007FC0F4E4E227h
                                          cmp esi, 02h
                                          jne 00007FC0F4E4E244h
                                          mov eax, dword ptr [10003150h]
                                          test eax, eax
                                          je 00007FC0F4E4E22Bh
                                          push edi
                                          push esi
                                          push ebx
                                          call eax
                                          test eax, eax
                                          je 00007FC0F4E4E22Eh
                                          push edi
                                          push esi
                                          push ebx
                                          call 00007FC0F4E4E13Ah
                                          test eax, eax
                                          jne 00007FC0F4E4E226h
                                          xor eax, eax
                                          jmp 00007FC0F4E4E270h
                                          push edi
                                          push esi
                                          push ebx
                                          call 00007FC0F4E4DFECh
                                          cmp esi, 01h
                                          mov dword ptr [ebp+0Ch], eax
                                          jne 00007FC0F4E4E22Eh
                                          test eax, eax
                                          jne 00007FC0F4E4E259h
                                          push edi
                                          push eax
                                          push ebx
                                          call 00007FC0F4E4E116h
                                          test esi, esi
                                          je 00007FC0F4E4E227h
                                          cmp esi, 03h
                                          jne 00007FC0F4E4E248h
                                          push edi
                                          push esi
                                          push ebx
                                          call 00007FC0F4E4E105h
                                          test eax, eax
                                          jne 00007FC0F4E4E225h
                                          and dword ptr [ebp+0Ch], eax
                                          cmp dword ptr [ebp+0Ch], 00000000h
                                          je 00007FC0F4E4E233h
                                          mov eax, dword ptr [10003150h]
                                          test eax, eax
                                          je 00007FC0F4E4E22Ah
                                          push edi
                                          push esi
                                          push ebx
                                          call eax
                                          mov dword ptr [ebp+0Ch], eax
                                          mov eax, dword ptr [ebp+0Ch]
                                          pop edi
                                          pop esi
                                          pop ebx
                                          pop ebp
                                          retn 000Ch
                                          jmp dword ptr [10002028h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          Programming Language:
                                          • [ C ] VS98 (6.0) build 8168
                                          • [C++] VS98 (6.0) build 8168
                                          • [RES] VS98 (6.0) cvtres build 1720
                                          • [LNK] VS98 (6.0) imp/exp build 8168
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x40000x5000600x501000bbaeaab34c74fc46c50e0563333e2dcaunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          W0x40600x500000dataEnglishUnited States0.8785324096679688
                                          DLLImport
                                          KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                          MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                          NameOrdinalAddress
                                          PlayGame10x10001114
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2025-01-15T19:07:05.916752+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.6541261.1.1.153UDP
                                          2025-01-15T19:07:06.827382+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649710103.224.212.21580TCP
                                          2025-01-15T19:07:08.395925+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649712103.224.212.21580TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 15, 2025 19:06:58.684674978 CET49673443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:06:58.684726000 CET49674443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:06:58.997253895 CET49672443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:05.302925110 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:05.302980900 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:05.303081036 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:05.303724051 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:05.303740978 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.103111029 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.103221893 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:06.108599901 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:06.108650923 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.109028101 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.111105919 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:06.111219883 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:06.111232996 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.111397028 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:06.155359983 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.227231979 CET4971080192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:06.232851028 CET8049710103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:06.232945919 CET4971080192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:06.233762980 CET4971080192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:06.238590956 CET8049710103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:06.282931089 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.283046961 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.283109903 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:06.312241077 CET49709443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:06.312272072 CET4434970940.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:06.827258110 CET8049710103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:06.827382088 CET4971080192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:06.827406883 CET8049710103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:06.827498913 CET4971080192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:06.851576090 CET4971080192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:06.856625080 CET8049710103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:07.184815884 CET4971180192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:07.189687967 CET8049711199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:07.190112114 CET4971180192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:07.190315008 CET4971180192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:07.195086002 CET8049711199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:07.663979053 CET8049711199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:07.664011002 CET8049711199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:07.664043903 CET4971180192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:07.664081097 CET4971180192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:07.670825958 CET4971180192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:07.670861959 CET4971180192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:07.800595999 CET4971280192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:07.805624008 CET8049712103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:07.805721998 CET4971280192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:07.805841923 CET4971280192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:07.810663939 CET8049712103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.066970110 CET4971380192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.072297096 CET8049713103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.072393894 CET4971380192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.072580099 CET4971380192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.077455044 CET8049713103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.294047117 CET49674443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:08.294048071 CET49673443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:08.395829916 CET8049712103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.395925045 CET4971280192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.395937920 CET8049712103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.395992994 CET4971280192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.399260998 CET4971280192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.400509119 CET4971480192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.404133081 CET8049712103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.405354977 CET8049714199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:08.405456066 CET4971480192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.405775070 CET4971480192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.410602093 CET8049714199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:08.606493950 CET49672443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:08.710063934 CET8049713103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.710124016 CET8049713103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.710143089 CET4971380192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.710172892 CET4971380192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.713366032 CET4971380192.168.2.6103.224.212.215
                                          Jan 15, 2025 19:07:08.715512991 CET4971680192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.718146086 CET8049713103.224.212.215192.168.2.6
                                          Jan 15, 2025 19:07:08.720355034 CET8049716199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:08.720845938 CET4971680192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.720845938 CET4971680192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.725584984 CET8049716199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:08.871181965 CET8049714199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:08.871243954 CET8049714199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:08.871387005 CET4971480192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.877643108 CET4971480192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.877657890 CET4971480192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:08.968210936 CET49717445192.168.2.649.114.69.241
                                          Jan 15, 2025 19:07:08.973159075 CET4454971749.114.69.241192.168.2.6
                                          Jan 15, 2025 19:07:08.974194050 CET49717445192.168.2.649.114.69.241
                                          Jan 15, 2025 19:07:08.983431101 CET49717445192.168.2.649.114.69.241
                                          Jan 15, 2025 19:07:08.983890057 CET49718445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:08.988328934 CET4454971749.114.69.241192.168.2.6
                                          Jan 15, 2025 19:07:08.988487005 CET49717445192.168.2.649.114.69.241
                                          Jan 15, 2025 19:07:08.988658905 CET4454971849.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:08.988992929 CET49718445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:08.989032030 CET49718445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:08.994040012 CET4454971849.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:08.994119883 CET49718445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:09.213135958 CET8049716199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:09.213175058 CET8049716199.59.243.228192.168.2.6
                                          Jan 15, 2025 19:07:09.213217974 CET4971680192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:09.213217974 CET4971680192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:09.281030893 CET4971680192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:09.281030893 CET4971680192.168.2.6199.59.243.228
                                          Jan 15, 2025 19:07:09.306107998 CET49719445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:09.310967922 CET4454971949.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:09.311081886 CET49719445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:09.311081886 CET49719445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:09.315987110 CET4454971949.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:10.282694101 CET44349706173.222.162.64192.168.2.6
                                          Jan 15, 2025 19:07:10.282773972 CET49706443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:10.920595884 CET49749445192.168.2.6158.87.244.157
                                          Jan 15, 2025 19:07:11.118004084 CET44549749158.87.244.157192.168.2.6
                                          Jan 15, 2025 19:07:11.118079901 CET49749445192.168.2.6158.87.244.157
                                          Jan 15, 2025 19:07:11.118164062 CET49749445192.168.2.6158.87.244.157
                                          Jan 15, 2025 19:07:11.118408918 CET49753445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:11.125686884 CET44549753158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:11.125780106 CET49753445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:11.125794888 CET44549749158.87.244.157192.168.2.6
                                          Jan 15, 2025 19:07:11.125814915 CET49753445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:11.125838041 CET49749445192.168.2.6158.87.244.157
                                          Jan 15, 2025 19:07:11.126980066 CET49754445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:11.130785942 CET44549753158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:11.130850077 CET49753445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:11.131778002 CET44549754158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:11.131839991 CET49754445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:11.131886005 CET49754445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:11.136673927 CET44549754158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:12.936170101 CET49785445192.168.2.675.228.122.178
                                          Jan 15, 2025 19:07:12.941823959 CET4454978575.228.122.178192.168.2.6
                                          Jan 15, 2025 19:07:12.941935062 CET49785445192.168.2.675.228.122.178
                                          Jan 15, 2025 19:07:12.942020893 CET49785445192.168.2.675.228.122.178
                                          Jan 15, 2025 19:07:12.942302942 CET49786445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:12.947053909 CET4454978575.228.122.178192.168.2.6
                                          Jan 15, 2025 19:07:12.947140932 CET49785445192.168.2.675.228.122.178
                                          Jan 15, 2025 19:07:12.947216988 CET4454978675.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:12.947282076 CET49786445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:12.947379112 CET49786445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:12.948532104 CET49787445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:12.952286959 CET4454978675.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:12.952334881 CET49786445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:12.953334093 CET4454978775.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:12.953402996 CET49787445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:12.953464985 CET49787445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:12.959069967 CET4454978775.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:13.193336964 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:13.193382978 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:13.193455935 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:13.193953037 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:13.193968058 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:13.975281954 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:13.975359917 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:13.978358030 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:13.978370905 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:13.978665113 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:13.980643988 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:13.980813026 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:13.980818987 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:13.980962992 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:14.027327061 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:14.155673027 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:14.155802965 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:14.155864954 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:14.155972004 CET49795443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:14.156022072 CET4434979540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:14.951996088 CET49822445192.168.2.6173.218.135.151
                                          Jan 15, 2025 19:07:14.957134008 CET44549822173.218.135.151192.168.2.6
                                          Jan 15, 2025 19:07:14.957241058 CET49822445192.168.2.6173.218.135.151
                                          Jan 15, 2025 19:07:14.957421064 CET49822445192.168.2.6173.218.135.151
                                          Jan 15, 2025 19:07:14.957659960 CET49823445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:14.962671995 CET44549822173.218.135.151192.168.2.6
                                          Jan 15, 2025 19:07:14.962718010 CET44549823173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:14.962764978 CET49822445192.168.2.6173.218.135.151
                                          Jan 15, 2025 19:07:14.962833881 CET49823445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:14.962886095 CET49823445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:14.964005947 CET49824445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:14.968075991 CET44549823173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:14.968158007 CET49823445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:14.969063997 CET44549824173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:14.969147921 CET49824445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:14.969250917 CET49824445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:14.974076986 CET44549824173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:16.967710018 CET49861445192.168.2.6203.128.199.61
                                          Jan 15, 2025 19:07:16.972565889 CET44549861203.128.199.61192.168.2.6
                                          Jan 15, 2025 19:07:16.972637892 CET49861445192.168.2.6203.128.199.61
                                          Jan 15, 2025 19:07:16.972676039 CET49861445192.168.2.6203.128.199.61
                                          Jan 15, 2025 19:07:16.972903013 CET49862445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:16.977729082 CET44549861203.128.199.61192.168.2.6
                                          Jan 15, 2025 19:07:16.977741957 CET44549862203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:16.977781057 CET49861445192.168.2.6203.128.199.61
                                          Jan 15, 2025 19:07:16.977830887 CET49862445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:16.977897882 CET49862445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:16.979085922 CET49863445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:16.982934952 CET44549862203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:16.982988119 CET49862445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:16.983944893 CET44549863203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:16.984024048 CET49863445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:16.984074116 CET49863445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:16.988864899 CET44549863203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:18.983289003 CET49896445192.168.2.6138.181.159.31
                                          Jan 15, 2025 19:07:18.988128901 CET44549896138.181.159.31192.168.2.6
                                          Jan 15, 2025 19:07:18.988207102 CET49896445192.168.2.6138.181.159.31
                                          Jan 15, 2025 19:07:18.988287926 CET49896445192.168.2.6138.181.159.31
                                          Jan 15, 2025 19:07:18.988549948 CET49897445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:18.993257999 CET44549896138.181.159.31192.168.2.6
                                          Jan 15, 2025 19:07:18.993314028 CET49896445192.168.2.6138.181.159.31
                                          Jan 15, 2025 19:07:18.993408918 CET44549897138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:18.993479013 CET49897445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:18.993521929 CET49897445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:18.994740963 CET49898445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:18.998418093 CET44549897138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:18.998466015 CET49897445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:18.999481916 CET44549898138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:18.999537945 CET49898445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:18.999629021 CET49898445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:19.004359007 CET44549898138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:20.998162031 CET49936445192.168.2.674.134.76.56
                                          Jan 15, 2025 19:07:21.003257036 CET4454993674.134.76.56192.168.2.6
                                          Jan 15, 2025 19:07:21.003340006 CET49936445192.168.2.674.134.76.56
                                          Jan 15, 2025 19:07:21.003437042 CET49936445192.168.2.674.134.76.56
                                          Jan 15, 2025 19:07:21.003595114 CET49937445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:21.008358002 CET4454993674.134.76.56192.168.2.6
                                          Jan 15, 2025 19:07:21.008430004 CET49936445192.168.2.674.134.76.56
                                          Jan 15, 2025 19:07:21.008459091 CET4454993774.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:21.008521080 CET49937445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:21.008568048 CET49937445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:21.012682915 CET49938445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:21.013732910 CET4454993774.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:21.013799906 CET49937445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:21.017591000 CET4454993874.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:21.017653942 CET49938445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:21.017677069 CET49938445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:21.022531033 CET4454993874.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:21.755347013 CET49706443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:21.755543947 CET49706443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:21.759330034 CET49952443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:21.759341955 CET44349952173.222.162.64192.168.2.6
                                          Jan 15, 2025 19:07:21.760024071 CET49952443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:21.760210991 CET44349706173.222.162.64192.168.2.6
                                          Jan 15, 2025 19:07:21.760262012 CET44349706173.222.162.64192.168.2.6
                                          Jan 15, 2025 19:07:21.760727882 CET49952443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:21.760735989 CET44349952173.222.162.64192.168.2.6
                                          Jan 15, 2025 19:07:22.374294043 CET44349952173.222.162.64192.168.2.6
                                          Jan 15, 2025 19:07:22.375336885 CET49952443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:23.013667107 CET49975445192.168.2.615.8.58.250
                                          Jan 15, 2025 19:07:23.018410921 CET4454997515.8.58.250192.168.2.6
                                          Jan 15, 2025 19:07:23.018538952 CET49975445192.168.2.615.8.58.250
                                          Jan 15, 2025 19:07:23.018627882 CET49975445192.168.2.615.8.58.250
                                          Jan 15, 2025 19:07:23.018836021 CET49976445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:23.023602009 CET4454997615.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:23.023688078 CET49976445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:23.023722887 CET49976445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:23.023825884 CET4454997515.8.58.250192.168.2.6
                                          Jan 15, 2025 19:07:23.023874998 CET49975445192.168.2.615.8.58.250
                                          Jan 15, 2025 19:07:23.024049044 CET49977445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:23.028610945 CET4454997615.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:23.028708935 CET49976445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:23.028839111 CET4454997715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:23.029027939 CET49977445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:23.029274940 CET49977445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:23.033997059 CET4454997715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:25.028975010 CET50010445192.168.2.6100.85.225.7
                                          Jan 15, 2025 19:07:25.034054041 CET44550010100.85.225.7192.168.2.6
                                          Jan 15, 2025 19:07:25.034154892 CET50010445192.168.2.6100.85.225.7
                                          Jan 15, 2025 19:07:25.034229994 CET50010445192.168.2.6100.85.225.7
                                          Jan 15, 2025 19:07:25.034338951 CET50011445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:25.039161921 CET44550011100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:25.039232016 CET50011445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:25.039249897 CET50011445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:25.039464951 CET44550010100.85.225.7192.168.2.6
                                          Jan 15, 2025 19:07:25.039532900 CET50010445192.168.2.6100.85.225.7
                                          Jan 15, 2025 19:07:25.039669037 CET50012445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:25.044392109 CET44550011100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:25.044456005 CET50011445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:25.044496059 CET44550012100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:25.044559956 CET50012445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:25.044579029 CET50012445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:25.049412966 CET44550012100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:25.207854033 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:25.207885027 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:25.207969904 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:25.208496094 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:25.208513021 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:25.986216068 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:25.986294985 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:25.989394903 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:25.989423037 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:25.989656925 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:25.991578102 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:25.991657972 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:25.991671085 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:25.991795063 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:26.039356947 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:26.180808067 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:26.181029081 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:26.181132078 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:26.181345940 CET50018443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:26.181375980 CET4435001840.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:27.044421911 CET50048445192.168.2.6104.205.84.157
                                          Jan 15, 2025 19:07:27.049232960 CET44550048104.205.84.157192.168.2.6
                                          Jan 15, 2025 19:07:27.049313068 CET50048445192.168.2.6104.205.84.157
                                          Jan 15, 2025 19:07:27.049333096 CET50048445192.168.2.6104.205.84.157
                                          Jan 15, 2025 19:07:27.049530983 CET50049445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:27.054291010 CET44550048104.205.84.157192.168.2.6
                                          Jan 15, 2025 19:07:27.054343939 CET50048445192.168.2.6104.205.84.157
                                          Jan 15, 2025 19:07:27.054558039 CET44550049104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:27.054709911 CET50049445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:27.054748058 CET50049445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:27.054944038 CET50050445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:27.059643984 CET44550049104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:27.059696913 CET50049445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:27.059712887 CET44550050104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:27.059786081 CET50050445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:27.059804916 CET50050445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:27.064553976 CET44550050104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:28.702294111 CET44550050104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:28.702389956 CET50050445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:28.702428102 CET50050445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:28.702449083 CET50050445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:28.707339048 CET44550050104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:28.707349062 CET44550050104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:29.060344934 CET50084445192.168.2.632.52.139.74
                                          Jan 15, 2025 19:07:29.065311909 CET4455008432.52.139.74192.168.2.6
                                          Jan 15, 2025 19:07:29.065382004 CET50084445192.168.2.632.52.139.74
                                          Jan 15, 2025 19:07:29.065409899 CET50084445192.168.2.632.52.139.74
                                          Jan 15, 2025 19:07:29.065521002 CET50085445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:29.070267916 CET4455008532.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:29.070323944 CET50085445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:29.070420980 CET50085445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:29.070522070 CET4455008432.52.139.74192.168.2.6
                                          Jan 15, 2025 19:07:29.070579052 CET50084445192.168.2.632.52.139.74
                                          Jan 15, 2025 19:07:29.070768118 CET50086445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:29.075253010 CET4455008532.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:29.075320959 CET50085445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:29.075613976 CET4455008632.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:29.075674057 CET50086445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:29.075694084 CET50086445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:29.080491066 CET4455008632.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:30.684396029 CET4454971949.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:30.684451103 CET49719445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:30.684622049 CET49719445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:30.684622049 CET49719445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:30.689357996 CET4454971949.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:30.689390898 CET4454971949.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:31.076302052 CET50124445192.168.2.67.138.150.221
                                          Jan 15, 2025 19:07:31.081228971 CET445501247.138.150.221192.168.2.6
                                          Jan 15, 2025 19:07:31.081321955 CET50124445192.168.2.67.138.150.221
                                          Jan 15, 2025 19:07:31.081410885 CET50124445192.168.2.67.138.150.221
                                          Jan 15, 2025 19:07:31.081573963 CET50125445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:31.086409092 CET445501257.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:31.086477995 CET50125445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:31.086510897 CET50125445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:31.086796045 CET50126445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:31.086826086 CET445501247.138.150.221192.168.2.6
                                          Jan 15, 2025 19:07:31.086889029 CET50124445192.168.2.67.138.150.221
                                          Jan 15, 2025 19:07:31.091635942 CET445501267.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:31.091711998 CET50126445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:31.091727972 CET50126445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:31.091783047 CET445501257.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:31.091840982 CET50125445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:31.096636057 CET445501267.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:31.716217995 CET50137445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:31.721088886 CET44550137104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:31.721200943 CET50137445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:31.721219063 CET50137445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:31.726052999 CET44550137104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:32.532027960 CET44549754158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:32.532253981 CET49754445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:32.532253981 CET49754445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:32.532315969 CET49754445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:32.537169933 CET44549754158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:32.537201881 CET44549754158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:33.091639996 CET50161445192.168.2.654.192.5.196
                                          Jan 15, 2025 19:07:33.096496105 CET4455016154.192.5.196192.168.2.6
                                          Jan 15, 2025 19:07:33.096616983 CET50161445192.168.2.654.192.5.196
                                          Jan 15, 2025 19:07:33.096669912 CET50161445192.168.2.654.192.5.196
                                          Jan 15, 2025 19:07:33.096911907 CET50162445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:33.101747036 CET4455016254.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:33.101830959 CET4455016154.192.5.196192.168.2.6
                                          Jan 15, 2025 19:07:33.101897001 CET50162445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:33.101933956 CET50161445192.168.2.654.192.5.196
                                          Jan 15, 2025 19:07:33.102092028 CET50162445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:33.102499962 CET50163445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:33.106914043 CET4455016254.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:33.107420921 CET4455016354.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:33.107510090 CET50162445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:33.107558966 CET50163445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:33.107630968 CET50163445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:33.112442017 CET4455016354.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:33.357063055 CET44550137104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:33.357170105 CET50137445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:33.357206106 CET50137445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:33.357232094 CET50137445192.168.2.6104.205.84.1
                                          Jan 15, 2025 19:07:33.362124920 CET44550137104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:33.362157106 CET44550137104.205.84.1192.168.2.6
                                          Jan 15, 2025 19:07:33.419404030 CET50169445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:33.424370050 CET44550169104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:33.424436092 CET50169445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:33.424499989 CET50169445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:33.424715042 CET50171445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:33.429441929 CET44550169104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:33.429512978 CET44550171104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:33.429527044 CET50169445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:33.429573059 CET50171445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:33.429619074 CET50171445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:33.434508085 CET44550171104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:33.685265064 CET50175445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:33.690191984 CET4455017549.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:33.690304041 CET50175445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:33.693955898 CET50175445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:33.698797941 CET4455017549.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:34.343050957 CET4454978775.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:34.343210936 CET49787445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:34.343211889 CET49787445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:34.343266964 CET49787445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:34.348282099 CET4454978775.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:34.348300934 CET4454978775.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:35.109550953 CET50190445192.168.2.653.194.27.144
                                          Jan 15, 2025 19:07:35.114536047 CET4455019053.194.27.144192.168.2.6
                                          Jan 15, 2025 19:07:35.114656925 CET50190445192.168.2.653.194.27.144
                                          Jan 15, 2025 19:07:35.114708900 CET50190445192.168.2.653.194.27.144
                                          Jan 15, 2025 19:07:35.114860058 CET50191445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:35.119699001 CET4455019053.194.27.144192.168.2.6
                                          Jan 15, 2025 19:07:35.119751930 CET4455019153.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:35.119762897 CET50190445192.168.2.653.194.27.144
                                          Jan 15, 2025 19:07:35.119831085 CET50191445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:35.119930029 CET50191445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:35.120186090 CET50192445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:35.124777079 CET4455019153.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:35.124835014 CET50191445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:35.125051022 CET4455019253.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:35.125127077 CET50192445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:35.125139952 CET50192445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:35.130116940 CET4455019253.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:35.544482946 CET50195445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:35.549470901 CET44550195158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:35.549707890 CET50195445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:35.549736023 CET50195445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:35.554577112 CET44550195158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:36.354484081 CET44549824173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:36.354547977 CET49824445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:36.354598999 CET49824445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:36.354660034 CET49824445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:36.359338045 CET44549824173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:36.359421968 CET44549824173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:37.130088091 CET50206445192.168.2.6117.29.223.41
                                          Jan 15, 2025 19:07:37.135126114 CET44550206117.29.223.41192.168.2.6
                                          Jan 15, 2025 19:07:37.135241985 CET50206445192.168.2.6117.29.223.41
                                          Jan 15, 2025 19:07:37.135303974 CET50206445192.168.2.6117.29.223.41
                                          Jan 15, 2025 19:07:37.135445118 CET50207445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:37.140352964 CET44550207117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:07:37.140448093 CET50207445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:37.140490055 CET50207445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:37.140578985 CET44550206117.29.223.41192.168.2.6
                                          Jan 15, 2025 19:07:37.141253948 CET50206445192.168.2.6117.29.223.41
                                          Jan 15, 2025 19:07:37.146277905 CET44550207117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:07:37.146434069 CET50208445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:37.146466017 CET50207445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:37.151422024 CET44550208117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:07:37.151496887 CET50208445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:37.151544094 CET50208445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:37.156393051 CET44550208117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:07:37.356879950 CET50212445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:37.361898899 CET4455021275.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:37.366250992 CET50212445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:37.366292953 CET50212445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:37.371131897 CET4455021275.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:38.323344946 CET44549863203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:38.323446035 CET49863445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:38.323446989 CET49863445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:38.323548079 CET49863445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:38.328480005 CET44549863203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:38.328510046 CET44549863203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:39.138400078 CET50223445192.168.2.6153.143.158.197
                                          Jan 15, 2025 19:07:39.146756887 CET44550223153.143.158.197192.168.2.6
                                          Jan 15, 2025 19:07:39.146910906 CET50223445192.168.2.6153.143.158.197
                                          Jan 15, 2025 19:07:39.147030115 CET50224445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:07:39.147037983 CET50223445192.168.2.6153.143.158.197
                                          Jan 15, 2025 19:07:39.156424046 CET44550224153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:07:39.156599998 CET44550223153.143.158.197192.168.2.6
                                          Jan 15, 2025 19:07:39.156620026 CET50224445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:07:39.156831026 CET50224445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:07:39.156841040 CET50223445192.168.2.6153.143.158.197
                                          Jan 15, 2025 19:07:39.157035112 CET50225445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:07:39.166346073 CET44550224153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:07:39.166429043 CET50224445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:07:39.166649103 CET44550225153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:07:39.166831970 CET50225445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:07:39.166831970 CET50225445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:07:39.176436901 CET44550225153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:07:39.357017040 CET50228445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:39.366512060 CET44550228173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:39.366611004 CET50228445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:39.366693020 CET50228445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:07:39.376329899 CET44550228173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:07:40.374283075 CET44549898138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:40.374433994 CET49898445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:40.374495983 CET49898445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:40.374557972 CET49898445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:40.379767895 CET44549898138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:40.379787922 CET44549898138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:41.154514074 CET50241445192.168.2.663.35.17.92
                                          Jan 15, 2025 19:07:41.159702063 CET4455024163.35.17.92192.168.2.6
                                          Jan 15, 2025 19:07:41.160073042 CET50241445192.168.2.663.35.17.92
                                          Jan 15, 2025 19:07:41.160073042 CET50241445192.168.2.663.35.17.92
                                          Jan 15, 2025 19:07:41.160165071 CET50242445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:07:41.165498972 CET4455024263.35.17.1192.168.2.6
                                          Jan 15, 2025 19:07:41.165510893 CET4455024163.35.17.92192.168.2.6
                                          Jan 15, 2025 19:07:41.165766001 CET50241445192.168.2.663.35.17.92
                                          Jan 15, 2025 19:07:41.165766001 CET50242445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:07:41.165766954 CET50242445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:07:41.166162014 CET50243445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:07:41.171037912 CET4455024263.35.17.1192.168.2.6
                                          Jan 15, 2025 19:07:41.171052933 CET4455024363.35.17.1192.168.2.6
                                          Jan 15, 2025 19:07:41.171144962 CET50242445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:07:41.171308994 CET50243445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:07:41.171308994 CET50243445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:07:41.176141024 CET4455024363.35.17.1192.168.2.6
                                          Jan 15, 2025 19:07:41.325809956 CET50244445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:41.330617905 CET44550244203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:41.330709934 CET50244445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:41.330768108 CET50244445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:07:41.335551977 CET44550244203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:07:41.534285069 CET44349952173.222.162.64192.168.2.6
                                          Jan 15, 2025 19:07:41.534408092 CET49952443192.168.2.6173.222.162.64
                                          Jan 15, 2025 19:07:42.386821985 CET4454993874.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:42.386897087 CET49938445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:42.386990070 CET49938445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:42.386990070 CET49938445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:42.392883062 CET4454993874.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:42.392894030 CET4454993874.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:43.169670105 CET50258445192.168.2.660.208.232.173
                                          Jan 15, 2025 19:07:43.174546003 CET4455025860.208.232.173192.168.2.6
                                          Jan 15, 2025 19:07:43.174638033 CET50258445192.168.2.660.208.232.173
                                          Jan 15, 2025 19:07:43.174673080 CET50258445192.168.2.660.208.232.173
                                          Jan 15, 2025 19:07:43.174798965 CET50259445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:07:43.179625034 CET4455025960.208.232.1192.168.2.6
                                          Jan 15, 2025 19:07:43.179691076 CET50259445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:07:43.179712057 CET50259445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:07:43.179738998 CET4455025860.208.232.173192.168.2.6
                                          Jan 15, 2025 19:07:43.180049896 CET50260445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:07:43.180077076 CET50258445192.168.2.660.208.232.173
                                          Jan 15, 2025 19:07:43.184717894 CET4455025960.208.232.1192.168.2.6
                                          Jan 15, 2025 19:07:43.184844017 CET50259445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:07:43.184911966 CET4455026060.208.232.1192.168.2.6
                                          Jan 15, 2025 19:07:43.184993029 CET50260445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:07:43.185007095 CET50260445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:07:43.189819098 CET4455026060.208.232.1192.168.2.6
                                          Jan 15, 2025 19:07:43.388096094 CET50263445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:43.392995119 CET44550263138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:43.393157959 CET50263445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:43.393157959 CET50263445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:07:43.398015022 CET44550263138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:07:43.427464008 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:43.427516937 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:43.427603006 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:43.428333998 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:43.428348064 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.230834007 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.230930090 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:44.235912085 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:44.235934019 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.236713886 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.238032103 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:44.238092899 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:44.238096952 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.238192081 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:44.279326916 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.401717901 CET4454997715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:44.401787996 CET49977445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:44.401818991 CET49977445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:44.401845932 CET49977445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:44.406734943 CET4454997715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:44.406764984 CET4454997715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:44.410409927 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.410619974 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.410681009 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:44.413705111 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:44.413722992 CET4435026440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:07:44.413738966 CET50264443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:07:45.044817924 CET50275445192.168.2.656.85.51.143
                                          Jan 15, 2025 19:07:45.049927950 CET4455027556.85.51.143192.168.2.6
                                          Jan 15, 2025 19:07:45.050043106 CET50275445192.168.2.656.85.51.143
                                          Jan 15, 2025 19:07:45.050754070 CET50275445192.168.2.656.85.51.143
                                          Jan 15, 2025 19:07:45.050940037 CET50276445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:07:45.055645943 CET4455027556.85.51.143192.168.2.6
                                          Jan 15, 2025 19:07:45.055752993 CET50275445192.168.2.656.85.51.143
                                          Jan 15, 2025 19:07:45.055897951 CET4455027656.85.51.1192.168.2.6
                                          Jan 15, 2025 19:07:45.055984020 CET50276445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:07:45.057794094 CET50276445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:07:45.058049917 CET50277445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:07:45.062699080 CET4455027656.85.51.1192.168.2.6
                                          Jan 15, 2025 19:07:45.062769890 CET50276445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:07:45.062956095 CET4455027756.85.51.1192.168.2.6
                                          Jan 15, 2025 19:07:45.063031912 CET50277445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:07:45.063095093 CET50277445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:07:45.067872047 CET4455027756.85.51.1192.168.2.6
                                          Jan 15, 2025 19:07:45.388246059 CET50279445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:45.393094063 CET4455027974.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:45.393291950 CET50279445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:45.400283098 CET50279445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:07:45.405029058 CET4455027974.134.76.1192.168.2.6
                                          Jan 15, 2025 19:07:46.416755915 CET44550012100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:46.416836977 CET50012445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:46.416876078 CET50012445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:46.416903973 CET50012445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:46.422533035 CET44550012100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:46.422580004 CET44550012100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:46.794723988 CET50290445192.168.2.6200.198.81.71
                                          Jan 15, 2025 19:07:46.799781084 CET44550290200.198.81.71192.168.2.6
                                          Jan 15, 2025 19:07:46.799985886 CET50290445192.168.2.6200.198.81.71
                                          Jan 15, 2025 19:07:46.800076962 CET50290445192.168.2.6200.198.81.71
                                          Jan 15, 2025 19:07:46.800425053 CET50291445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:07:46.805263996 CET44550290200.198.81.71192.168.2.6
                                          Jan 15, 2025 19:07:46.805315018 CET44550291200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:07:46.805344105 CET50290445192.168.2.6200.198.81.71
                                          Jan 15, 2025 19:07:46.805411100 CET50291445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:07:46.805574894 CET50291445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:07:46.806014061 CET50292445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:07:46.810584068 CET44550291200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:07:46.810673952 CET50291445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:07:46.810895920 CET44550292200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:07:46.810971022 CET50292445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:07:46.811007023 CET50292445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:07:46.815792084 CET44550292200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:07:47.403759003 CET50297445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:47.408824921 CET4455029715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:47.408899069 CET50297445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:47.408952951 CET50297445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:07:47.414047956 CET4455029715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:07:48.435570955 CET50304445192.168.2.6117.41.142.10
                                          Jan 15, 2025 19:07:48.440480947 CET44550304117.41.142.10192.168.2.6
                                          Jan 15, 2025 19:07:48.440572977 CET50304445192.168.2.6117.41.142.10
                                          Jan 15, 2025 19:07:48.440618038 CET50304445192.168.2.6117.41.142.10
                                          Jan 15, 2025 19:07:48.440740108 CET50305445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:07:48.445521116 CET44550305117.41.142.1192.168.2.6
                                          Jan 15, 2025 19:07:48.445589066 CET50305445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:07:48.445612907 CET50305445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:07:48.445617914 CET44550304117.41.142.10192.168.2.6
                                          Jan 15, 2025 19:07:48.445678949 CET50304445192.168.2.6117.41.142.10
                                          Jan 15, 2025 19:07:48.445959091 CET50306445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:07:48.450541973 CET44550305117.41.142.1192.168.2.6
                                          Jan 15, 2025 19:07:48.450597048 CET50305445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:07:48.450865030 CET44550306117.41.142.1192.168.2.6
                                          Jan 15, 2025 19:07:48.450939894 CET50306445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:07:48.450993061 CET50306445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:07:48.455960035 CET44550306117.41.142.1192.168.2.6
                                          Jan 15, 2025 19:07:49.419349909 CET50315445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:49.424175024 CET44550315100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:49.424248934 CET50315445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:49.424299002 CET50315445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:07:49.429049015 CET44550315100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:07:49.966727972 CET50318445192.168.2.674.226.207.102
                                          Jan 15, 2025 19:07:49.971667051 CET4455031874.226.207.102192.168.2.6
                                          Jan 15, 2025 19:07:49.971787930 CET50318445192.168.2.674.226.207.102
                                          Jan 15, 2025 19:07:49.971848011 CET50318445192.168.2.674.226.207.102
                                          Jan 15, 2025 19:07:49.972141981 CET50319445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:07:49.976845026 CET4455031874.226.207.102192.168.2.6
                                          Jan 15, 2025 19:07:49.977121115 CET4455031974.226.207.1192.168.2.6
                                          Jan 15, 2025 19:07:49.977190971 CET50319445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:07:49.977226019 CET50319445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:07:49.977252007 CET4455031874.226.207.102192.168.2.6
                                          Jan 15, 2025 19:07:49.977313042 CET50318445192.168.2.674.226.207.102
                                          Jan 15, 2025 19:07:49.977444887 CET50320445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:07:49.982175112 CET4455031974.226.207.1192.168.2.6
                                          Jan 15, 2025 19:07:49.982254982 CET50319445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:07:49.982292891 CET4455032074.226.207.1192.168.2.6
                                          Jan 15, 2025 19:07:49.982381105 CET50320445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:07:49.982381105 CET50320445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:07:49.987200022 CET4455032074.226.207.1192.168.2.6
                                          Jan 15, 2025 19:07:50.438658953 CET4455008632.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:50.438752890 CET50086445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:50.438803911 CET50086445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:50.438827038 CET50086445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:50.443696976 CET4455008632.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:50.443706989 CET4455008632.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:51.388660908 CET50325445192.168.2.6149.241.237.229
                                          Jan 15, 2025 19:07:51.393640995 CET44550325149.241.237.229192.168.2.6
                                          Jan 15, 2025 19:07:51.393752098 CET50325445192.168.2.6149.241.237.229
                                          Jan 15, 2025 19:07:51.393773079 CET50325445192.168.2.6149.241.237.229
                                          Jan 15, 2025 19:07:51.393968105 CET50326445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:07:51.399224043 CET44550325149.241.237.229192.168.2.6
                                          Jan 15, 2025 19:07:51.399272919 CET44550326149.241.237.1192.168.2.6
                                          Jan 15, 2025 19:07:51.399539948 CET50325445192.168.2.6149.241.237.229
                                          Jan 15, 2025 19:07:51.399641991 CET50326445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:07:51.399641991 CET50326445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:07:51.400167942 CET50327445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:07:51.404683113 CET44550326149.241.237.1192.168.2.6
                                          Jan 15, 2025 19:07:51.404764891 CET50326445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:07:51.405050993 CET44550327149.241.237.1192.168.2.6
                                          Jan 15, 2025 19:07:51.405138016 CET50327445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:07:51.405196905 CET50327445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:07:51.410012960 CET44550327149.241.237.1192.168.2.6
                                          Jan 15, 2025 19:07:52.466298103 CET445501267.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:52.466399908 CET50126445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:52.466451883 CET50126445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:52.466501951 CET50126445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:52.471472025 CET445501267.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:52.471486092 CET445501267.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:52.747355938 CET50328445192.168.2.67.192.148.128
                                          Jan 15, 2025 19:07:52.752413988 CET445503287.192.148.128192.168.2.6
                                          Jan 15, 2025 19:07:52.752542973 CET50328445192.168.2.67.192.148.128
                                          Jan 15, 2025 19:07:52.752595901 CET50328445192.168.2.67.192.148.128
                                          Jan 15, 2025 19:07:52.752759933 CET50329445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:07:52.757556915 CET445503297.192.148.1192.168.2.6
                                          Jan 15, 2025 19:07:52.757636070 CET50329445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:07:52.757862091 CET50329445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:07:52.758181095 CET50330445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:07:52.758327007 CET445503287.192.148.128192.168.2.6
                                          Jan 15, 2025 19:07:52.758389950 CET50328445192.168.2.67.192.148.128
                                          Jan 15, 2025 19:07:52.762723923 CET445503297.192.148.1192.168.2.6
                                          Jan 15, 2025 19:07:52.762788057 CET50329445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:07:52.762988091 CET445503307.192.148.1192.168.2.6
                                          Jan 15, 2025 19:07:52.763053894 CET50330445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:07:52.763098001 CET50330445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:07:52.767832041 CET445503307.192.148.1192.168.2.6
                                          Jan 15, 2025 19:07:53.450679064 CET50331445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:53.455630064 CET4455033132.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:53.455738068 CET50331445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:53.455787897 CET50331445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:07:53.460566044 CET4455033132.52.139.1192.168.2.6
                                          Jan 15, 2025 19:07:53.951919079 CET50332445192.168.2.6160.120.91.248
                                          Jan 15, 2025 19:07:53.956970930 CET44550332160.120.91.248192.168.2.6
                                          Jan 15, 2025 19:07:53.957087040 CET50332445192.168.2.6160.120.91.248
                                          Jan 15, 2025 19:07:53.957139015 CET50332445192.168.2.6160.120.91.248
                                          Jan 15, 2025 19:07:53.957357883 CET50333445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:07:53.962151051 CET44550332160.120.91.248192.168.2.6
                                          Jan 15, 2025 19:07:53.962208986 CET44550333160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:07:53.962224960 CET50332445192.168.2.6160.120.91.248
                                          Jan 15, 2025 19:07:53.962291956 CET50333445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:07:53.962378025 CET50333445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:07:53.962675095 CET50334445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:07:53.967365980 CET44550333160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:07:53.967561960 CET44550334160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:07:53.967619896 CET50333445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:07:53.967641115 CET50334445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:07:53.967694998 CET50334445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:07:53.972486019 CET44550334160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:07:54.513029099 CET4455016354.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:54.513149023 CET50163445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:54.513209105 CET50163445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:54.513231039 CET50163445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:54.519049883 CET4455016354.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:54.519063950 CET4455016354.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:54.791965008 CET44550171104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:54.792037010 CET50171445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:54.792181015 CET50171445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:54.792244911 CET50171445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:54.797014952 CET44550171104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:54.797060966 CET44550171104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:55.042624950 CET4455017549.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:55.042767048 CET50175445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:55.042889118 CET50175445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:55.042968035 CET50175445192.168.2.649.114.69.1
                                          Jan 15, 2025 19:07:55.047730923 CET4455017549.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:55.048012018 CET4455017549.114.69.1192.168.2.6
                                          Jan 15, 2025 19:07:55.107081890 CET50335445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:07:55.107256889 CET50336445192.168.2.6203.223.187.164
                                          Jan 15, 2025 19:07:55.112025976 CET4455033549.114.69.2192.168.2.6
                                          Jan 15, 2025 19:07:55.112061024 CET44550336203.223.187.164192.168.2.6
                                          Jan 15, 2025 19:07:55.112132072 CET50335445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:07:55.112169981 CET50336445192.168.2.6203.223.187.164
                                          Jan 15, 2025 19:07:55.112286091 CET50335445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:07:55.112382889 CET50336445192.168.2.6203.223.187.164
                                          Jan 15, 2025 19:07:55.112519026 CET50337445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:07:55.112715006 CET50338445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:07:55.117253065 CET4455033549.114.69.2192.168.2.6
                                          Jan 15, 2025 19:07:55.117327929 CET50335445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:07:55.117351055 CET44550337203.223.187.1192.168.2.6
                                          Jan 15, 2025 19:07:55.117384911 CET44550336203.223.187.164192.168.2.6
                                          Jan 15, 2025 19:07:55.117410898 CET50337445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:07:55.117432117 CET50336445192.168.2.6203.223.187.164
                                          Jan 15, 2025 19:07:55.117507935 CET50337445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:07:55.117508888 CET4455033849.114.69.2192.168.2.6
                                          Jan 15, 2025 19:07:55.117573023 CET50338445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:07:55.117619038 CET50338445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:07:55.117747068 CET50339445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:07:55.122335911 CET44550337203.223.187.1192.168.2.6
                                          Jan 15, 2025 19:07:55.122390985 CET50337445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:07:55.122400999 CET4455033849.114.69.2192.168.2.6
                                          Jan 15, 2025 19:07:55.122474909 CET44550339203.223.187.1192.168.2.6
                                          Jan 15, 2025 19:07:55.122550964 CET50339445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:07:55.122551918 CET50339445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:07:55.127310991 CET44550339203.223.187.1192.168.2.6
                                          Jan 15, 2025 19:07:55.481987953 CET50340445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:55.486915112 CET445503407.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:55.487019062 CET50340445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:55.487076044 CET50340445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:07:55.491823912 CET445503407.138.150.1192.168.2.6
                                          Jan 15, 2025 19:07:56.185487986 CET50341445192.168.2.6209.63.158.237
                                          Jan 15, 2025 19:07:56.190593958 CET44550341209.63.158.237192.168.2.6
                                          Jan 15, 2025 19:07:56.190723896 CET50341445192.168.2.6209.63.158.237
                                          Jan 15, 2025 19:07:56.190723896 CET50341445192.168.2.6209.63.158.237
                                          Jan 15, 2025 19:07:56.190813065 CET50342445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:07:56.195888996 CET44550342209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:07:56.196002007 CET50342445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:07:56.196002007 CET50342445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:07:56.196094990 CET44550341209.63.158.237192.168.2.6
                                          Jan 15, 2025 19:07:56.196167946 CET50341445192.168.2.6209.63.158.237
                                          Jan 15, 2025 19:07:56.196310043 CET50343445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:07:56.201401949 CET44550342209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:07:56.201432943 CET44550343209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:07:56.201471090 CET50342445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:07:56.201512098 CET50343445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:07:56.201545954 CET50343445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:07:56.206367016 CET44550343209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:07:56.497688055 CET4455019253.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:56.497773886 CET50192445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:56.497814894 CET50192445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:56.497848988 CET50192445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:56.502717972 CET4455019253.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:56.502789021 CET4455019253.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:56.917726040 CET44550195158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:56.918061018 CET50195445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:56.918061972 CET50195445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:56.918746948 CET50195445192.168.2.6158.87.244.1
                                          Jan 15, 2025 19:07:56.923763990 CET44550195158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:56.924282074 CET44550195158.87.244.1192.168.2.6
                                          Jan 15, 2025 19:07:56.982055902 CET50344445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:07:56.986959934 CET44550344158.87.244.2192.168.2.6
                                          Jan 15, 2025 19:07:56.987066031 CET50344445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:07:56.987080097 CET50344445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:07:56.987355947 CET50345445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:07:56.991965055 CET44550344158.87.244.2192.168.2.6
                                          Jan 15, 2025 19:07:56.992031097 CET50344445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:07:56.992162943 CET44550345158.87.244.2192.168.2.6
                                          Jan 15, 2025 19:07:56.992244959 CET50345445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:07:56.992290020 CET50345445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:07:56.997021914 CET44550345158.87.244.2192.168.2.6
                                          Jan 15, 2025 19:07:57.529335022 CET50347445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:57.536782980 CET4455034754.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:57.536902905 CET50347445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:57.537085056 CET50347445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:07:57.543690920 CET4455034754.192.5.1192.168.2.6
                                          Jan 15, 2025 19:07:57.811491013 CET50348445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:57.817121983 CET44550348104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:57.817223072 CET50348445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:57.817269087 CET50348445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:07:57.823009968 CET44550348104.205.84.2192.168.2.6
                                          Jan 15, 2025 19:07:58.276407957 CET50349445192.168.2.623.94.219.189
                                          Jan 15, 2025 19:07:58.281374931 CET4455034923.94.219.189192.168.2.6
                                          Jan 15, 2025 19:07:58.281481028 CET50349445192.168.2.623.94.219.189
                                          Jan 15, 2025 19:07:58.284516096 CET50349445192.168.2.623.94.219.189
                                          Jan 15, 2025 19:07:58.284750938 CET50350445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:07:58.289560080 CET4455035023.94.219.1192.168.2.6
                                          Jan 15, 2025 19:07:58.289575100 CET4455034923.94.219.189192.168.2.6
                                          Jan 15, 2025 19:07:58.289669037 CET50350445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:07:58.289719105 CET50349445192.168.2.623.94.219.189
                                          Jan 15, 2025 19:07:58.309585094 CET50350445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:07:58.310766935 CET50351445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:07:58.314532042 CET4455035023.94.219.1192.168.2.6
                                          Jan 15, 2025 19:07:58.314599991 CET50350445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:07:58.315601110 CET4455035123.94.219.1192.168.2.6
                                          Jan 15, 2025 19:07:58.315670013 CET50351445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:07:58.315910101 CET50351445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:07:58.320785046 CET4455035123.94.219.1192.168.2.6
                                          Jan 15, 2025 19:07:58.388261080 CET50352445192.168.2.6118.54.82.136
                                          Jan 15, 2025 19:07:58.393177986 CET44550352118.54.82.136192.168.2.6
                                          Jan 15, 2025 19:07:58.393253088 CET50352445192.168.2.6118.54.82.136
                                          Jan 15, 2025 19:07:58.393296957 CET50352445192.168.2.6118.54.82.136
                                          Jan 15, 2025 19:07:58.393528938 CET50353445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:07:58.398212910 CET44550352118.54.82.136192.168.2.6
                                          Jan 15, 2025 19:07:58.398271084 CET50352445192.168.2.6118.54.82.136
                                          Jan 15, 2025 19:07:58.398297071 CET44550353118.54.82.1192.168.2.6
                                          Jan 15, 2025 19:07:58.398355961 CET50353445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:07:58.398391008 CET50353445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:07:58.398967028 CET50354445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:07:58.403558969 CET44550353118.54.82.1192.168.2.6
                                          Jan 15, 2025 19:07:58.403626919 CET50353445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:07:58.404084921 CET44550354118.54.82.1192.168.2.6
                                          Jan 15, 2025 19:07:58.404154062 CET50354445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:07:58.404201031 CET50354445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:07:58.408947945 CET44550354118.54.82.1192.168.2.6
                                          Jan 15, 2025 19:07:58.548374891 CET44550208117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:07:58.548510075 CET50208445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:58.548543930 CET50208445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:58.548578978 CET50208445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:07:58.554785967 CET44550208117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:07:58.554817915 CET44550208117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:07:58.745901108 CET4455021275.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:58.745979071 CET50212445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:58.746059895 CET50212445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:58.746146917 CET50212445192.168.2.675.228.122.1
                                          Jan 15, 2025 19:07:58.750804901 CET4455021275.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:58.750909090 CET4455021275.228.122.1192.168.2.6
                                          Jan 15, 2025 19:07:58.810504913 CET50356445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:07:58.815359116 CET4455035675.228.122.2192.168.2.6
                                          Jan 15, 2025 19:07:58.815440893 CET50356445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:07:58.815638065 CET50356445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:07:58.816358089 CET50357445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:07:58.820477009 CET4455035675.228.122.2192.168.2.6
                                          Jan 15, 2025 19:07:58.820545912 CET50356445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:07:58.821132898 CET4455035775.228.122.2192.168.2.6
                                          Jan 15, 2025 19:07:58.821299076 CET50357445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:07:58.823530912 CET50357445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:07:58.828344107 CET4455035775.228.122.2192.168.2.6
                                          Jan 15, 2025 19:07:59.076035976 CET50358445192.168.2.6126.115.83.115
                                          Jan 15, 2025 19:07:59.081528902 CET44550358126.115.83.115192.168.2.6
                                          Jan 15, 2025 19:07:59.081625938 CET50358445192.168.2.6126.115.83.115
                                          Jan 15, 2025 19:07:59.081665039 CET50358445192.168.2.6126.115.83.115
                                          Jan 15, 2025 19:07:59.081779003 CET50359445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:07:59.086668968 CET44550359126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:07:59.086749077 CET50359445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:07:59.086826086 CET50359445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:07:59.086946011 CET44550358126.115.83.115192.168.2.6
                                          Jan 15, 2025 19:07:59.087006092 CET50358445192.168.2.6126.115.83.115
                                          Jan 15, 2025 19:07:59.087196112 CET50360445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:07:59.091794014 CET44550359126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:07:59.091893911 CET50359445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:07:59.092133045 CET44550360126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:07:59.092250109 CET50360445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:07:59.092345953 CET50360445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:07:59.097150087 CET44550360126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:07:59.514703989 CET50361445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:59.519824982 CET4455036153.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:59.519922018 CET50361445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:59.519965887 CET50361445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:07:59.524858952 CET4455036153.194.27.1192.168.2.6
                                          Jan 15, 2025 19:07:59.904352903 CET50362445192.168.2.6186.162.98.9
                                          Jan 15, 2025 19:07:59.909423113 CET44550362186.162.98.9192.168.2.6
                                          Jan 15, 2025 19:07:59.912786961 CET50362445192.168.2.6186.162.98.9
                                          Jan 15, 2025 19:07:59.912872076 CET50362445192.168.2.6186.162.98.9
                                          Jan 15, 2025 19:07:59.913105965 CET50363445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:07:59.917972088 CET44550363186.162.98.1192.168.2.6
                                          Jan 15, 2025 19:07:59.918005943 CET44550362186.162.98.9192.168.2.6
                                          Jan 15, 2025 19:07:59.918103933 CET50362445192.168.2.6186.162.98.9
                                          Jan 15, 2025 19:07:59.918117046 CET50363445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:07:59.918224096 CET50363445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:07:59.918589115 CET50364445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:07:59.923100948 CET44550363186.162.98.1192.168.2.6
                                          Jan 15, 2025 19:07:59.923410892 CET44550364186.162.98.1192.168.2.6
                                          Jan 15, 2025 19:07:59.923480988 CET50363445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:07:59.923516035 CET50364445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:07:59.923551083 CET50364445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:07:59.928343058 CET44550364186.162.98.1192.168.2.6
                                          Jan 15, 2025 19:08:00.513906002 CET44550225153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:08:00.514061928 CET50225445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:08:00.514183998 CET50225445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:08:00.514230013 CET50225445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:08:00.519016027 CET44550225153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:08:00.519033909 CET44550225153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:08:00.677325010 CET50365445192.168.2.6216.15.111.218
                                          Jan 15, 2025 19:08:00.682456017 CET44550365216.15.111.218192.168.2.6
                                          Jan 15, 2025 19:08:00.682559967 CET50365445192.168.2.6216.15.111.218
                                          Jan 15, 2025 19:08:00.682632923 CET50365445192.168.2.6216.15.111.218
                                          Jan 15, 2025 19:08:00.682790041 CET50366445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:00.687774897 CET44550366216.15.111.1192.168.2.6
                                          Jan 15, 2025 19:08:00.687808037 CET44550365216.15.111.218192.168.2.6
                                          Jan 15, 2025 19:08:00.687922955 CET50365445192.168.2.6216.15.111.218
                                          Jan 15, 2025 19:08:00.687922955 CET50366445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:00.691889048 CET50366445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:00.692893982 CET50367445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:00.696743965 CET44550366216.15.111.1192.168.2.6
                                          Jan 15, 2025 19:08:00.696835041 CET50366445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:00.697753906 CET44550367216.15.111.1192.168.2.6
                                          Jan 15, 2025 19:08:00.697834969 CET50367445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:00.699640036 CET50367445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:00.704440117 CET44550367216.15.111.1192.168.2.6
                                          Jan 15, 2025 19:08:00.745937109 CET44550228173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:08:00.746160030 CET50228445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:08:00.759784937 CET50228445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:08:00.759784937 CET50228445192.168.2.6173.218.135.1
                                          Jan 15, 2025 19:08:00.764908075 CET44550228173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:08:00.764947891 CET44550228173.218.135.1192.168.2.6
                                          Jan 15, 2025 19:08:00.850472927 CET50368445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:00.855674982 CET44550368173.218.135.2192.168.2.6
                                          Jan 15, 2025 19:08:00.855777979 CET50368445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:00.859610081 CET50368445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:00.864523888 CET44550368173.218.135.2192.168.2.6
                                          Jan 15, 2025 19:08:00.866624117 CET50368445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:00.976231098 CET50369445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:00.981215000 CET44550369173.218.135.2192.168.2.6
                                          Jan 15, 2025 19:08:00.981302023 CET50369445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:00.981323957 CET50369445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:00.986115932 CET44550369173.218.135.2192.168.2.6
                                          Jan 15, 2025 19:08:01.041080952 CET44550360126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:01.041222095 CET50360445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:01.051574945 CET50360445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:01.051716089 CET50360445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:01.056546926 CET44550360126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:01.056581974 CET44550360126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:01.560249090 CET50371445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:08:01.566181898 CET44550371117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:08:01.566359043 CET50371445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:08:01.566359043 CET50371445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:08:01.571356058 CET44550371117.29.223.1192.168.2.6
                                          Jan 15, 2025 19:08:02.562516928 CET4455024363.35.17.1192.168.2.6
                                          Jan 15, 2025 19:08:02.562880039 CET50243445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:08:02.562880039 CET50243445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:08:02.562947035 CET50243445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:08:02.570368052 CET4455024363.35.17.1192.168.2.6
                                          Jan 15, 2025 19:08:02.570383072 CET4455024363.35.17.1192.168.2.6
                                          Jan 15, 2025 19:08:02.702385902 CET44550244203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:08:02.702689886 CET50244445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:08:02.702689886 CET50244445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:08:02.706312895 CET50244445192.168.2.6203.128.199.1
                                          Jan 15, 2025 19:08:02.710333109 CET44550244203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:08:02.711361885 CET44550244203.128.199.1192.168.2.6
                                          Jan 15, 2025 19:08:02.763384104 CET50375445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:02.768341064 CET44550375203.128.199.2192.168.2.6
                                          Jan 15, 2025 19:08:02.768435955 CET50375445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:02.768474102 CET50375445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:02.768889904 CET50376445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:02.774338961 CET44550375203.128.199.2192.168.2.6
                                          Jan 15, 2025 19:08:02.774349928 CET44550376203.128.199.2192.168.2.6
                                          Jan 15, 2025 19:08:02.774399042 CET50375445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:02.774424076 CET50376445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:02.774444103 CET50376445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:02.779367924 CET44550376203.128.199.2192.168.2.6
                                          Jan 15, 2025 19:08:03.529146910 CET50379445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:08:03.534398079 CET44550379153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:08:03.534488916 CET50379445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:08:03.534533024 CET50379445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:08:03.539351940 CET44550379153.143.158.1192.168.2.6
                                          Jan 15, 2025 19:08:04.060297966 CET50383445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:04.066366911 CET44550383126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:04.066513062 CET50383445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:04.069334984 CET50383445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:04.074071884 CET44550383126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:04.595419884 CET4455026060.208.232.1192.168.2.6
                                          Jan 15, 2025 19:08:04.595757008 CET50260445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:08:04.595854998 CET50260445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:08:04.595895052 CET50260445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:08:04.600728035 CET4455026060.208.232.1192.168.2.6
                                          Jan 15, 2025 19:08:04.600760937 CET4455026060.208.232.1192.168.2.6
                                          Jan 15, 2025 19:08:04.762208939 CET44550263138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:08:04.762715101 CET50263445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:08:04.762715101 CET50263445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:08:04.762769938 CET50263445192.168.2.6138.181.159.1
                                          Jan 15, 2025 19:08:04.767682076 CET44550263138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:08:04.767689943 CET44550263138.181.159.1192.168.2.6
                                          Jan 15, 2025 19:08:04.825910091 CET50389445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:04.830878973 CET44550389138.181.159.2192.168.2.6
                                          Jan 15, 2025 19:08:04.830980062 CET50389445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:04.831069946 CET50389445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:04.831347942 CET50390445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:04.836282969 CET44550389138.181.159.2192.168.2.6
                                          Jan 15, 2025 19:08:04.836293936 CET44550390138.181.159.2192.168.2.6
                                          Jan 15, 2025 19:08:04.836393118 CET50389445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:04.836432934 CET50390445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:04.836447001 CET50390445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:04.841310024 CET44550390138.181.159.2192.168.2.6
                                          Jan 15, 2025 19:08:05.575761080 CET50397445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:08:05.580903053 CET4455039763.35.17.1192.168.2.6
                                          Jan 15, 2025 19:08:05.581002951 CET50397445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:08:05.581029892 CET50397445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:08:05.585860014 CET4455039763.35.17.1192.168.2.6
                                          Jan 15, 2025 19:08:05.630764961 CET44550343209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:05.630908012 CET50343445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:05.630986929 CET50343445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:05.631014109 CET50343445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:05.636010885 CET44550343209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:05.636044025 CET44550343209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:06.054929018 CET44550383126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:06.055001020 CET50383445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:06.055043936 CET50383445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:06.055058956 CET50383445192.168.2.6126.115.83.1
                                          Jan 15, 2025 19:08:06.059899092 CET44550383126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:06.059909105 CET44550383126.115.83.1192.168.2.6
                                          Jan 15, 2025 19:08:06.099208117 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.099251032 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:06.099373102 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.100135088 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.100146055 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:06.107176065 CET50405445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:06.112591982 CET44550405126.115.83.2192.168.2.6
                                          Jan 15, 2025 19:08:06.112720966 CET50405445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:06.112761021 CET50405445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:06.113003969 CET50406445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:06.117799997 CET44550406126.115.83.2192.168.2.6
                                          Jan 15, 2025 19:08:06.117873907 CET50406445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:06.117925882 CET50406445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:06.119281054 CET44550405126.115.83.2192.168.2.6
                                          Jan 15, 2025 19:08:06.119359970 CET50405445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:06.122685909 CET44550406126.115.83.2192.168.2.6
                                          Jan 15, 2025 19:08:06.435926914 CET4455027756.85.51.1192.168.2.6
                                          Jan 15, 2025 19:08:06.436039925 CET50277445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:08:06.436122894 CET50277445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:08:06.436192989 CET50277445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:08:06.444905996 CET4455027756.85.51.1192.168.2.6
                                          Jan 15, 2025 19:08:06.444915056 CET4455027756.85.51.1192.168.2.6
                                          Jan 15, 2025 19:08:06.779027939 CET4455027974.134.76.1192.168.2.6
                                          Jan 15, 2025 19:08:06.779216051 CET50279445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:08:06.779262066 CET50279445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:08:06.779262066 CET50279445192.168.2.674.134.76.1
                                          Jan 15, 2025 19:08:06.784034014 CET4455027974.134.76.1192.168.2.6
                                          Jan 15, 2025 19:08:06.784051895 CET4455027974.134.76.1192.168.2.6
                                          Jan 15, 2025 19:08:06.841454029 CET50414445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:06.846430063 CET4455041474.134.76.2192.168.2.6
                                          Jan 15, 2025 19:08:06.846548080 CET50414445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:06.846625090 CET50414445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:06.847022057 CET50415445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:06.851660967 CET4455041474.134.76.2192.168.2.6
                                          Jan 15, 2025 19:08:06.851784945 CET50414445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:06.852025986 CET4455041574.134.76.2192.168.2.6
                                          Jan 15, 2025 19:08:06.852102995 CET50415445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:06.852132082 CET50415445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:06.856977940 CET4455041574.134.76.2192.168.2.6
                                          Jan 15, 2025 19:08:06.921268940 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:06.921370983 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.923072100 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.923079014 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:06.923288107 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:06.925219059 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.925255060 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.925261021 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:06.925384045 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:06.967330933 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:07.159595013 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:07.159718037 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:07.159779072 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:07.159945011 CET50404443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:07.159960985 CET4435040440.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:07.607033968 CET50425445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:08:07.613262892 CET4455042560.208.232.1192.168.2.6
                                          Jan 15, 2025 19:08:07.613382101 CET50425445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:08:07.613414049 CET50425445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:08:07.618304968 CET4455042560.208.232.1192.168.2.6
                                          Jan 15, 2025 19:08:08.152410984 CET44550292200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:08:08.152493954 CET50292445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:08:08.152561903 CET50292445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:08:08.152614117 CET50292445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:08:08.157421112 CET44550292200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:08:08.157649040 CET44550292200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:08:08.355443954 CET44550334160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:08:08.355596066 CET50334445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:08:08.355699062 CET50334445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:08:08.355699062 CET50334445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:08:08.360574961 CET44550334160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:08:08.360604048 CET44550334160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:08:08.638201952 CET50443445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:08.643279076 CET44550443209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:08.643394947 CET50443445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:08.643471003 CET50443445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:08.648376942 CET44550443209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:08.777215958 CET4455029715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:08:08.777421951 CET50297445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:08:08.777565956 CET50297445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:08:08.777611971 CET50297445192.168.2.615.8.58.1
                                          Jan 15, 2025 19:08:08.782407045 CET4455029715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:08:08.782421112 CET4455029715.8.58.1192.168.2.6
                                          Jan 15, 2025 19:08:08.841924906 CET50450445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:08.846961975 CET4455045015.8.58.2192.168.2.6
                                          Jan 15, 2025 19:08:08.847057104 CET50450445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:08.847094059 CET50450445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:08.847471952 CET50452445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:08.852106094 CET4455045015.8.58.2192.168.2.6
                                          Jan 15, 2025 19:08:08.852180004 CET50450445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:08.852279902 CET4455045215.8.58.2192.168.2.6
                                          Jan 15, 2025 19:08:08.852355003 CET50452445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:08.852391005 CET50452445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:08.857168913 CET4455045215.8.58.2192.168.2.6
                                          Jan 15, 2025 19:08:09.450618029 CET50466445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:08:09.455578089 CET4455046656.85.51.1192.168.2.6
                                          Jan 15, 2025 19:08:09.455647945 CET50466445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:08:09.455677032 CET50466445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:08:09.460467100 CET4455046656.85.51.1192.168.2.6
                                          Jan 15, 2025 19:08:09.808418989 CET44550306117.41.142.1192.168.2.6
                                          Jan 15, 2025 19:08:09.808522940 CET50306445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:08:09.808573008 CET50306445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:08:09.808593988 CET50306445192.168.2.6117.41.142.1
                                          Jan 15, 2025 19:08:09.813399076 CET44550306117.41.142.1192.168.2.6
                                          Jan 15, 2025 19:08:09.813410044 CET44550306117.41.142.1192.168.2.6
                                          Jan 15, 2025 19:08:10.174705982 CET44550443209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:10.174808979 CET50443445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:10.174808979 CET50443445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:10.175046921 CET50443445192.168.2.6209.63.158.1
                                          Jan 15, 2025 19:08:10.179807901 CET44550443209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:10.179907084 CET44550443209.63.158.1192.168.2.6
                                          Jan 15, 2025 19:08:10.231942892 CET50487445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:10.237040997 CET44550487209.63.158.2192.168.2.6
                                          Jan 15, 2025 19:08:10.237124920 CET50487445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:10.237253904 CET50487445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:10.237612009 CET50488445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:10.242223024 CET44550487209.63.158.2192.168.2.6
                                          Jan 15, 2025 19:08:10.242288113 CET50487445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:10.242485046 CET44550488209.63.158.2192.168.2.6
                                          Jan 15, 2025 19:08:10.242547989 CET50488445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:10.242633104 CET50488445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:10.247802019 CET44550488209.63.158.2192.168.2.6
                                          Jan 15, 2025 19:08:10.808722019 CET44550315100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:08:10.809089899 CET50315445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:08:10.809223890 CET50315445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:08:10.809223890 CET50315445192.168.2.6100.85.225.1
                                          Jan 15, 2025 19:08:10.814132929 CET44550315100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:08:10.814165115 CET44550315100.85.225.1192.168.2.6
                                          Jan 15, 2025 19:08:10.872859955 CET50511445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:10.877914906 CET44550511100.85.225.2192.168.2.6
                                          Jan 15, 2025 19:08:10.878009081 CET50511445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:10.878057957 CET50511445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:10.878467083 CET50512445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:10.883223057 CET44550511100.85.225.2192.168.2.6
                                          Jan 15, 2025 19:08:10.883306980 CET50511445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:10.883454084 CET44550512100.85.225.2192.168.2.6
                                          Jan 15, 2025 19:08:10.883519888 CET50512445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:10.883565903 CET50512445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:10.888441086 CET44550512100.85.225.2192.168.2.6
                                          Jan 15, 2025 19:08:11.153846979 CET50526445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:08:11.158793926 CET44550526200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:08:11.158971071 CET50526445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:08:11.159008980 CET50526445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:08:11.163798094 CET44550526200.198.81.1192.168.2.6
                                          Jan 15, 2025 19:08:11.340625048 CET4455032074.226.207.1192.168.2.6
                                          Jan 15, 2025 19:08:11.340728998 CET50320445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:08:11.340766907 CET50320445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:08:11.340811014 CET50320445192.168.2.674.226.207.1
                                          Jan 15, 2025 19:08:11.345710993 CET4455032074.226.207.1192.168.2.6
                                          Jan 15, 2025 19:08:11.345746994 CET4455032074.226.207.1192.168.2.6
                                          Jan 15, 2025 19:08:11.356964111 CET50537445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:08:11.361876965 CET44550537160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:08:11.361994028 CET50537445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:08:11.362013102 CET50537445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:08:11.366800070 CET44550537160.120.91.1192.168.2.6
                                          Jan 15, 2025 19:08:12.761574984 CET44550327149.241.237.1192.168.2.6
                                          Jan 15, 2025 19:08:12.761639118 CET50327445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:08:13.941730022 CET50340445192.168.2.67.138.150.1
                                          Jan 15, 2025 19:08:13.941770077 CET50488445192.168.2.6209.63.158.2
                                          Jan 15, 2025 19:08:13.941839933 CET50331445192.168.2.632.52.139.1
                                          Jan 15, 2025 19:08:13.941868067 CET50330445192.168.2.67.192.148.1
                                          Jan 15, 2025 19:08:13.941912889 CET50379445192.168.2.6153.143.158.1
                                          Jan 15, 2025 19:08:13.941937923 CET50537445192.168.2.6160.120.91.1
                                          Jan 15, 2025 19:08:13.941968918 CET50348445192.168.2.6104.205.84.2
                                          Jan 15, 2025 19:08:13.942074060 CET50351445192.168.2.623.94.219.1
                                          Jan 15, 2025 19:08:13.942081928 CET50327445192.168.2.6149.241.237.1
                                          Jan 15, 2025 19:08:13.942087889 CET50338445192.168.2.649.114.69.2
                                          Jan 15, 2025 19:08:13.942111969 CET50339445192.168.2.6203.223.187.1
                                          Jan 15, 2025 19:08:13.942137003 CET50345445192.168.2.6158.87.244.2
                                          Jan 15, 2025 19:08:13.942159891 CET50347445192.168.2.654.192.5.1
                                          Jan 15, 2025 19:08:13.942228079 CET50354445192.168.2.6118.54.82.1
                                          Jan 15, 2025 19:08:13.942255974 CET50357445192.168.2.675.228.122.2
                                          Jan 15, 2025 19:08:13.942291975 CET50361445192.168.2.653.194.27.1
                                          Jan 15, 2025 19:08:13.942315102 CET50364445192.168.2.6186.162.98.1
                                          Jan 15, 2025 19:08:13.942327023 CET50367445192.168.2.6216.15.111.1
                                          Jan 15, 2025 19:08:13.942357063 CET50369445192.168.2.6173.218.135.2
                                          Jan 15, 2025 19:08:13.942372084 CET50371445192.168.2.6117.29.223.1
                                          Jan 15, 2025 19:08:13.942409992 CET50376445192.168.2.6203.128.199.2
                                          Jan 15, 2025 19:08:13.942421913 CET50390445192.168.2.6138.181.159.2
                                          Jan 15, 2025 19:08:13.942451000 CET50406445192.168.2.6126.115.83.2
                                          Jan 15, 2025 19:08:13.942476988 CET50397445192.168.2.663.35.17.1
                                          Jan 15, 2025 19:08:13.942511082 CET50415445192.168.2.674.134.76.2
                                          Jan 15, 2025 19:08:13.942521095 CET50425445192.168.2.660.208.232.1
                                          Jan 15, 2025 19:08:13.942559958 CET50452445192.168.2.615.8.58.2
                                          Jan 15, 2025 19:08:13.942605972 CET50466445192.168.2.656.85.51.1
                                          Jan 15, 2025 19:08:13.942732096 CET50512445192.168.2.6100.85.225.2
                                          Jan 15, 2025 19:08:13.942821980 CET50526445192.168.2.6200.198.81.1
                                          Jan 15, 2025 19:08:36.045248985 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.045325994 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:36.045442104 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.046173096 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.046189070 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:36.874906063 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:36.875030041 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.881354094 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.881405115 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:36.881630898 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:36.883933067 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.884007931 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.884021044 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:36.884164095 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:36.931338072 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:37.059964895 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:37.060039043 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:37.060250044 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:37.060817957 CET50635443192.168.2.640.115.3.253
                                          Jan 15, 2025 19:08:37.060858965 CET4435063540.115.3.253192.168.2.6
                                          Jan 15, 2025 19:08:38.403872967 CET49703443192.168.2.640.126.31.71
                                          Jan 15, 2025 19:08:38.404001951 CET4970480192.168.2.6199.232.214.172
                                          Jan 15, 2025 19:08:38.410449028 CET4434970340.126.31.71192.168.2.6
                                          Jan 15, 2025 19:08:38.410465956 CET8049704199.232.214.172192.168.2.6
                                          Jan 15, 2025 19:08:38.410501957 CET49703443192.168.2.640.126.31.71
                                          Jan 15, 2025 19:08:38.410545111 CET4970480192.168.2.6199.232.214.172
                                          Jan 15, 2025 19:08:40.700705051 CET49707443192.168.2.640.126.31.71
                                          Jan 15, 2025 19:08:40.706965923 CET4434970740.126.31.71192.168.2.6
                                          Jan 15, 2025 19:08:40.707125902 CET49707443192.168.2.640.126.31.71
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 15, 2025 19:07:05.916752100 CET5412653192.168.2.61.1.1.1
                                          Jan 15, 2025 19:07:06.222209930 CET53541261.1.1.1192.168.2.6
                                          Jan 15, 2025 19:07:06.852595091 CET5434953192.168.2.61.1.1.1
                                          Jan 15, 2025 19:07:07.183099985 CET53543491.1.1.1192.168.2.6
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jan 15, 2025 19:07:05.916752100 CET192.168.2.61.1.1.10x47b4Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                          Jan 15, 2025 19:07:06.852595091 CET192.168.2.61.1.1.10x79baStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jan 15, 2025 19:07:06.222209930 CET1.1.1.1192.168.2.60x47b4No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                          Jan 15, 2025 19:07:07.183099985 CET1.1.1.1192.168.2.60x79baNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                          Jan 15, 2025 19:07:07.183099985 CET1.1.1.1192.168.2.60x79baNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                          • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.649710103.224.212.215804800C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 19:07:06.233762980 CET100OUTGET / HTTP/1.1
                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Cache-Control: no-cache
                                          Jan 15, 2025 19:07:06.827258110 CET365INHTTP/1.1 302 Found
                                          date: Wed, 15 Jan 2025 18:07:06 GMT
                                          server: Apache
                                          set-cookie: __tad=1736964426.6027517; expires=Sat, 13-Jan-2035 18:07:06 GMT; Max-Age=315360000
                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-06c2-ab55-018cebe831fb
                                          content-length: 2
                                          content-type: text/html; charset=UTF-8
                                          connection: close
                                          Data Raw: 0a 0a
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.649711199.59.243.228804800C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 19:07:07.190315008 CET169OUTGET /?subid1=20250116-0507-06c2-ab55-018cebe831fb HTTP/1.1
                                          Cache-Control: no-cache
                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Connection: Keep-Alive
                                          Jan 15, 2025 19:07:07.663979053 CET1236INHTTP/1.1 200 OK
                                          date: Wed, 15 Jan 2025 18:07:07 GMT
                                          content-type: text/html; charset=utf-8
                                          content-length: 1262
                                          x-request-id: 667eccaa-c04f-4d79-96f2-58e7887f231d
                                          cache-control: no-store, max-age=0
                                          accept-ch: sec-ch-prefers-color-scheme
                                          critical-ch: sec-ch-prefers-color-scheme
                                          vary: sec-ch-prefers-color-scheme
                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_xm8eVMwpBdKZLe38vkVy+wg5jP0gveriH4XsHT2TcQAfyyaGPtUyo4sdW1g6tuqoAhg2qsa0CLxpo8JgwTl64Q==
                                          set-cookie: parking_session=667eccaa-c04f-4d79-96f2-58e7887f231d; expires=Wed, 15 Jan 2025 18:22:07 GMT; path=/
                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 78 6d 38 65 56 4d 77 70 42 64 4b 5a 4c 65 33 38 76 6b 56 79 2b 77 67 35 6a 50 30 67 76 65 72 69 48 34 58 73 48 54 32 54 63 51 41 66 79 79 61 47 50 74 55 79 6f 34 73 64 57 31 67 36 74 75 71 6f 41 68 67 32 71 73 61 30 43 4c 78 70 6f 38 4a 67 77 54 6c 36 34 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_xm8eVMwpBdKZLe38vkVy+wg5jP0gveriH4XsHT2TcQAfyyaGPtUyo4sdW1g6tuqoAhg2qsa0CLxpo8JgwTl64Q==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                          Jan 15, 2025 19:07:07.664011002 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                          Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNjY3ZWNjYWEtYzA0Zi00ZDc5LTk2ZjItNThlNzg4N2YyMzFkIiwicGFnZV90aW1lIjoxNzM2OTY0NDI3LCJwYWdlX3VybCI6I


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.2.649712103.224.212.215803748C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 19:07:07.805841923 CET100OUTGET / HTTP/1.1
                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Cache-Control: no-cache
                                          Jan 15, 2025 19:07:08.395829916 CET365INHTTP/1.1 302 Found
                                          date: Wed, 15 Jan 2025 18:07:08 GMT
                                          server: Apache
                                          set-cookie: __tad=1736964428.6005750; expires=Sat, 13-Jan-2035 18:07:08 GMT; Max-Age=315360000
                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-08af-9581-038eeaa6c39e
                                          content-length: 2
                                          content-type: text/html; charset=UTF-8
                                          connection: close
                                          Data Raw: 0a 0a
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          3192.168.2.649713103.224.212.215803816C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 19:07:08.072580099 CET134OUTGET / HTTP/1.1
                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Cache-Control: no-cache
                                          Cookie: __tad=1736964426.6027517
                                          Jan 15, 2025 19:07:08.710063934 CET269INHTTP/1.1 302 Found
                                          date: Wed, 15 Jan 2025 18:07:08 GMT
                                          server: Apache
                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250116-0507-0847-82be-09ad5d5cb439
                                          content-length: 2
                                          content-type: text/html; charset=UTF-8
                                          connection: close
                                          Data Raw: 0a 0a
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          4192.168.2.649714199.59.243.228803748C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 19:07:08.405775070 CET169OUTGET /?subid1=20250116-0507-08af-9581-038eeaa6c39e HTTP/1.1
                                          Cache-Control: no-cache
                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Connection: Keep-Alive
                                          Jan 15, 2025 19:07:08.871181965 CET1236INHTTP/1.1 200 OK
                                          date: Wed, 15 Jan 2025 18:07:08 GMT
                                          content-type: text/html; charset=utf-8
                                          content-length: 1262
                                          x-request-id: 491776b3-8083-4b0a-9c34-4dd1d3f72373
                                          cache-control: no-store, max-age=0
                                          accept-ch: sec-ch-prefers-color-scheme
                                          critical-ch: sec-ch-prefers-color-scheme
                                          vary: sec-ch-prefers-color-scheme
                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_kQdeWsPNsJCFxVy984sNjITWEIKq4EnFNQUjcGfwcRntEVWzBup/sJ2ivdv82QOB9ijK5OmQpQU0Y+RwmTMLWQ==
                                          set-cookie: parking_session=491776b3-8083-4b0a-9c34-4dd1d3f72373; expires=Wed, 15 Jan 2025 18:22:08 GMT; path=/
                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6b 51 64 65 57 73 50 4e 73 4a 43 46 78 56 79 39 38 34 73 4e 6a 49 54 57 45 49 4b 71 34 45 6e 46 4e 51 55 6a 63 47 66 77 63 52 6e 74 45 56 57 7a 42 75 70 2f 73 4a 32 69 76 64 76 38 32 51 4f 42 39 69 6a 4b 35 4f 6d 51 70 51 55 30 59 2b 52 77 6d 54 4d 4c 57 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_kQdeWsPNsJCFxVy984sNjITWEIKq4EnFNQUjcGfwcRntEVWzBup/sJ2ivdv82QOB9ijK5OmQpQU0Y+RwmTMLWQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                          Jan 15, 2025 19:07:08.871243954 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                          Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNDkxNzc2YjMtODA4My00YjBhLTljMzQtNGRkMWQzZjcyMzczIiwicGFnZV90aW1lIjoxNzM2OTY0NDI4LCJwYWdlX3VybCI6I


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          5192.168.2.649716199.59.243.228803816C:\Windows\mssecsvr.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 15, 2025 19:07:08.720845938 CET231OUTGET /?subid1=20250116-0507-0847-82be-09ad5d5cb439 HTTP/1.1
                                          Cache-Control: no-cache
                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                          Connection: Keep-Alive
                                          Cookie: parking_session=667eccaa-c04f-4d79-96f2-58e7887f231d
                                          Jan 15, 2025 19:07:09.213135958 CET1236INHTTP/1.1 200 OK
                                          date: Wed, 15 Jan 2025 18:07:09 GMT
                                          content-type: text/html; charset=utf-8
                                          content-length: 1262
                                          x-request-id: 746a1603-5762-4e2f-9adc-217287677af4
                                          cache-control: no-store, max-age=0
                                          accept-ch: sec-ch-prefers-color-scheme
                                          critical-ch: sec-ch-prefers-color-scheme
                                          vary: sec-ch-prefers-color-scheme
                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_lrm99a85YdGeGsahbniGQO39W7jIyz65LunvwYkUR0Sb7OPbYnylve1EkHb/GY8rMHzTr36YNfBr3Wbvc3t3tQ==
                                          set-cookie: parking_session=667eccaa-c04f-4d79-96f2-58e7887f231d; expires=Wed, 15 Jan 2025 18:22:09 GMT
                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6c 72 6d 39 39 61 38 35 59 64 47 65 47 73 61 68 62 6e 69 47 51 4f 33 39 57 37 6a 49 79 7a 36 35 4c 75 6e 76 77 59 6b 55 52 30 53 62 37 4f 50 62 59 6e 79 6c 76 65 31 45 6b 48 62 2f 47 59 38 72 4d 48 7a 54 72 33 36 59 4e 66 42 72 33 57 62 76 63 33 74 33 74 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_lrm99a85YdGeGsahbniGQO39W7jIyz65LunvwYkUR0Sb7OPbYnylve1EkHb/GY8rMHzTr36YNfBr3Wbvc3t3tQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                          Jan 15, 2025 19:07:09.213175058 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                          Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNjY3ZWNjYWEtYzA0Zi00ZDc5LTk2ZjItNThlNzg4N2YyMzFkIiwicGFnZV90aW1lIjoxNzM2OTY0NDI5LCJwYWdlX3VybCI6Imh0dHA6L


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          0192.168.2.64970940.115.3.253443
                                          TimestampBytes transferredDirectionData
                                          2025-01-15 18:07:06 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 69 61 50 38 75 4f 49 6b 42 30 61 7a 33 46 30 48 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 34 39 38 38 31 63 31 64 62 66 62 66 62 39 39 0d 0a 0d 0a
                                          Data Ascii: CNT 1 CON 305MS-CV: iaP8uOIkB0az3F0H.1Context: f49881c1dbfbfb99
                                          2025-01-15 18:07:06 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                          Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                          2025-01-15 18:07:06 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 69 61 50 38 75 4f 49 6b 42 30 61 7a 33 46 30 48 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 34 39 38 38 31 63 31 64 62 66 62 66 62 39 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                          Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: iaP8uOIkB0az3F0H.2Context: f49881c1dbfbfb99<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                          2025-01-15 18:07:06 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 69 61 50 38 75 4f 49 6b 42 30 61 7a 33 46 30 48 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 34 39 38 38 31 63 31 64 62 66 62 66 62 39 39 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                          Data Ascii: BND 3 CON\WNS 0 197MS-CV: iaP8uOIkB0az3F0H.3Context: f49881c1dbfbfb99<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                          2025-01-15 18:07:06 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                          Data Ascii: 202 1 CON 58
                                          2025-01-15 18:07:06 UTC58INData Raw: 4d 53 2d 43 56 3a 20 64 53 4c 58 53 54 77 52 73 45 79 61 71 4b 63 5a 74 65 45 31 63 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                          Data Ascii: MS-CV: dSLXSTwRsEyaqKcZteE1cg.0Payload parsing failed.


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          1192.168.2.64979540.115.3.253443
                                          TimestampBytes transferredDirectionData
                                          2025-01-15 18:07:13 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 79 37 59 32 45 68 72 54 59 55 71 6a 43 45 67 2b 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 64 63 32 65 35 61 39 31 36 66 64 33 31 66 35 0d 0a 0d 0a
                                          Data Ascii: CNT 1 CON 305MS-CV: y7Y2EhrTYUqjCEg+.1Context: 6dc2e5a916fd31f5
                                          2025-01-15 18:07:13 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                          Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                          2025-01-15 18:07:13 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 79 37 59 32 45 68 72 54 59 55 71 6a 43 45 67 2b 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 64 63 32 65 35 61 39 31 36 66 64 33 31 66 35 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                          Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: y7Y2EhrTYUqjCEg+.2Context: 6dc2e5a916fd31f5<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                          2025-01-15 18:07:13 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 79 37 59 32 45 68 72 54 59 55 71 6a 43 45 67 2b 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 64 63 32 65 35 61 39 31 36 66 64 33 31 66 35 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                          Data Ascii: BND 3 CON\WNS 0 197MS-CV: y7Y2EhrTYUqjCEg+.3Context: 6dc2e5a916fd31f5<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                          2025-01-15 18:07:14 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                          Data Ascii: 202 1 CON 58
                                          2025-01-15 18:07:14 UTC58INData Raw: 4d 53 2d 43 56 3a 20 39 37 70 6d 35 76 51 54 56 45 47 71 47 78 72 2b 61 38 46 4e 6c 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                          Data Ascii: MS-CV: 97pm5vQTVEGqGxr+a8FNlw.0Payload parsing failed.


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          2192.168.2.65001840.115.3.253443
                                          TimestampBytes transferredDirectionData
                                          2025-01-15 18:07:25 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6a 4e 72 74 75 4d 75 54 4e 30 2b 67 50 76 54 56 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 32 36 61 37 65 61 61 35 38 38 65 31 66 33 39 0d 0a 0d 0a
                                          Data Ascii: CNT 1 CON 305MS-CV: jNrtuMuTN0+gPvTV.1Context: e26a7eaa588e1f39
                                          2025-01-15 18:07:25 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                          Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                          2025-01-15 18:07:25 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6a 4e 72 74 75 4d 75 54 4e 30 2b 67 50 76 54 56 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 32 36 61 37 65 61 61 35 38 38 65 31 66 33 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                          Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: jNrtuMuTN0+gPvTV.2Context: e26a7eaa588e1f39<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                          2025-01-15 18:07:25 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6a 4e 72 74 75 4d 75 54 4e 30 2b 67 50 76 54 56 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 32 36 61 37 65 61 61 35 38 38 65 31 66 33 39 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                          Data Ascii: BND 3 CON\WNS 0 197MS-CV: jNrtuMuTN0+gPvTV.3Context: e26a7eaa588e1f39<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                          2025-01-15 18:07:26 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                          Data Ascii: 202 1 CON 58
                                          2025-01-15 18:07:26 UTC58INData Raw: 4d 53 2d 43 56 3a 20 54 6d 6f 2f 53 44 74 34 56 55 61 41 4a 39 41 75 2b 31 38 32 69 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                          Data Ascii: MS-CV: Tmo/SDt4VUaAJ9Au+182iw.0Payload parsing failed.


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          3192.168.2.65026440.115.3.253443
                                          TimestampBytes transferredDirectionData
                                          2025-01-15 18:07:44 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 7a 48 7a 57 6f 4d 46 71 50 55 47 46 37 39 74 37 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 63 35 36 65 64 63 66 66 66 36 37 65 36 32 62 0d 0a 0d 0a
                                          Data Ascii: CNT 1 CON 305MS-CV: zHzWoMFqPUGF79t7.1Context: ec56edcfff67e62b
                                          2025-01-15 18:07:44 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                          Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                          2025-01-15 18:07:44 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 7a 48 7a 57 6f 4d 46 71 50 55 47 46 37 39 74 37 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 63 35 36 65 64 63 66 66 66 36 37 65 36 32 62 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                          Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: zHzWoMFqPUGF79t7.2Context: ec56edcfff67e62b<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                          2025-01-15 18:07:44 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 7a 48 7a 57 6f 4d 46 71 50 55 47 46 37 39 74 37 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 63 35 36 65 64 63 66 66 66 36 37 65 36 32 62 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                          Data Ascii: BND 3 CON\WNS 0 197MS-CV: zHzWoMFqPUGF79t7.3Context: ec56edcfff67e62b<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                          2025-01-15 18:07:44 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                          Data Ascii: 202 1 CON 58
                                          2025-01-15 18:07:44 UTC58INData Raw: 4d 53 2d 43 56 3a 20 74 78 50 48 49 31 30 52 34 30 32 2b 46 33 6b 78 66 65 2f 70 45 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                          Data Ascii: MS-CV: txPHI10R402+F3kxfe/pEA.0Payload parsing failed.


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          4192.168.2.65040440.115.3.253443
                                          TimestampBytes transferredDirectionData
                                          2025-01-15 18:08:06 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 33 4f 34 59 33 49 73 68 75 6b 6d 4b 37 4b 2b 58 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 66 35 64 66 34 34 34 66 65 37 63 30 36 63 31 0d 0a 0d 0a
                                          Data Ascii: CNT 1 CON 305MS-CV: 3O4Y3IshukmK7K+X.1Context: ff5df444fe7c06c1
                                          2025-01-15 18:08:06 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                          Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                          2025-01-15 18:08:06 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 33 4f 34 59 33 49 73 68 75 6b 6d 4b 37 4b 2b 58 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 66 35 64 66 34 34 34 66 65 37 63 30 36 63 31 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                          Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 3O4Y3IshukmK7K+X.2Context: ff5df444fe7c06c1<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                          2025-01-15 18:08:06 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 33 4f 34 59 33 49 73 68 75 6b 6d 4b 37 4b 2b 58 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 66 35 64 66 34 34 34 66 65 37 63 30 36 63 31 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                          Data Ascii: BND 3 CON\WNS 0 197MS-CV: 3O4Y3IshukmK7K+X.3Context: ff5df444fe7c06c1<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                          2025-01-15 18:08:07 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                          Data Ascii: 202 1 CON 58
                                          2025-01-15 18:08:07 UTC58INData Raw: 4d 53 2d 43 56 3a 20 41 77 45 32 72 4f 7a 34 39 6b 79 50 70 36 33 6d 73 44 76 6a 4d 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                          Data Ascii: MS-CV: AwE2rOz49kyPp63msDvjMQ.0Payload parsing failed.


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          5192.168.2.65063540.115.3.253443
                                          TimestampBytes transferredDirectionData
                                          2025-01-15 18:08:36 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4f 52 78 45 34 6e 41 4c 39 55 2b 48 44 5a 33 76 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 34 65 33 31 62 33 37 33 62 61 39 35 38 65 39 0d 0a 0d 0a
                                          Data Ascii: CNT 1 CON 305MS-CV: ORxE4nAL9U+HDZ3v.1Context: d4e31b373ba958e9
                                          2025-01-15 18:08:36 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                          Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                          2025-01-15 18:08:36 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4f 52 78 45 34 6e 41 4c 39 55 2b 48 44 5a 33 76 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 34 65 33 31 62 33 37 33 62 61 39 35 38 65 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 52 45 2b 7a 48 4d 6e 30 63 46 79 47 75 30 6f 35 62 69 7a 4b 42 31 78 37 65 49 50 45 79 49 55 72 4f 48 6a 2f 53 53 7a 71 78 30 4d 77 34 2b 7a 57 77 46 57 55 43 41 50 32 55 76 67 4d 31 55 4d 51 35 2f 4d 67 67 52 6f 78 77 72 74 57 4b 45 55 79 79 4e 6c 6a 6b 62 4f 4e 37 4f 4f 5a 47 4f 2b 4b 2f 58 2b 6a 34 39 4e 39 74 58 39 78 55
                                          Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: ORxE4nAL9U+HDZ3v.2Context: d4e31b373ba958e9<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAARE+zHMn0cFyGu0o5bizKB1x7eIPEyIUrOHj/SSzqx0Mw4+zWwFWUCAP2UvgM1UMQ5/MggRoxwrtWKEUyyNljkbON7OOZGO+K/X+j49N9tX9xU
                                          2025-01-15 18:08:36 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4f 52 78 45 34 6e 41 4c 39 55 2b 48 44 5a 33 76 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 34 65 33 31 62 33 37 33 62 61 39 35 38 65 39 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                          Data Ascii: BND 3 CON\WNS 0 197MS-CV: ORxE4nAL9U+HDZ3v.3Context: d4e31b373ba958e9<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                          2025-01-15 18:08:37 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                          Data Ascii: 202 1 CON 58
                                          2025-01-15 18:08:37 UTC58INData Raw: 4d 53 2d 43 56 3a 20 76 69 57 62 4b 34 76 34 55 6b 79 63 6c 30 75 67 68 6d 75 55 48 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                          Data Ascii: MS-CV: viWbK4v4Ukycl0ughmuUHA.0Payload parsing failed.


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:13:07:03
                                          Start date:15/01/2025
                                          Path:C:\Windows\System32\loaddll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:loaddll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll"
                                          Imagebase:0x9b0000
                                          File size:126'464 bytes
                                          MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:1
                                          Start time:13:07:03
                                          Start date:15/01/2025
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:13:07:03
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1
                                          Imagebase:0x1c0000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:13:07:03
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:rundll32.exe C:\Users\user\Desktop\QQE81XYXon.dll,PlayGame
                                          Imagebase:0x3b0000
                                          File size:61'440 bytes
                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:13:07:03
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",#1
                                          Imagebase:0x3b0000
                                          File size:61'440 bytes
                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:13:07:03
                                          Start date:15/01/2025
                                          Path:C:\Windows\mssecsvr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\WINDOWS\mssecsvr.exe
                                          Imagebase:0x400000
                                          File size:2'281'472 bytes
                                          MD5 hash:6BFA175E3CBD626EF26394826EDB0FDF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2152520017.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.2152654639.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.2152654639.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          Reputation:low
                                          Has exited:true

                                          Target ID:8
                                          Start time:13:07:06
                                          Start date:15/01/2025
                                          Path:C:\Windows\mssecsvr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                          Imagebase:0x400000
                                          File size:2'281'472 bytes
                                          MD5 hash:6BFA175E3CBD626EF26394826EDB0FDF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2179028546.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.2179157814.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000000.2179157814.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2827299654.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2827299654.0000000001D5C000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2827534382.0000000002286000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000008.00000002.2827534382.0000000002286000.00000004.00000020.00020000.00000000.sdmp, Author: us-cert code analysis team
                                          Reputation:low
                                          Has exited:true

                                          Target ID:9
                                          Start time:13:07:06
                                          Start date:15/01/2025
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:rundll32.exe "C:\Users\user\Desktop\QQE81XYXon.dll",PlayGame
                                          Imagebase:0x3b0000
                                          File size:61'440 bytes
                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:13:07:06
                                          Start date:15/01/2025
                                          Path:C:\Windows\mssecsvr.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\WINDOWS\mssecsvr.exe
                                          Imagebase:0x400000
                                          File size:2'281'472 bytes
                                          MD5 hash:6BFA175E3CBD626EF26394826EDB0FDF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2196270495.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2180935665.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.2181333198.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000000.2181333198.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.2196435843.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 0000000A.00000002.2196435843.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                                          Reputation:low
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:71.7%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:63.2%
                                            Total number of Nodes:38
                                            Total number of Limit Nodes:9
                                            execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                            Callgraph

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FA10EF0,?,00000000), ref: 00407CEF
                                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                            • sprintf.MSVCRT ref: 00407E01
                                            • sprintf.MSVCRT ref: 00407E18
                                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                            • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                            • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                            • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                            • CreateProcessA.KERNELBASE ref: 00407EE8
                                            • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                            • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2194999882.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2194970989.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195017472.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195088572.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                            • API String ID: 4281112323-1507730452
                                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2194999882.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2194970989.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195017472.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195088572.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                            • String ID:
                                            • API String ID: 801014965-0
                                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                            Control-flow Graph

                                            APIs
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                            Strings
                                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2194999882.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2194970989.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195017472.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195088572.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            • API String ID: 774561529-2614457033
                                            • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                            • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                            • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                            • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                            Control-flow Graph

                                            APIs
                                            • sprintf.MSVCRT ref: 00407C56
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FA10EF0,00000000), ref: 00407C9B
                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2194999882.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2194970989.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195017472.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195088572.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                            • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                            • API String ID: 3340711343-2450984573
                                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • __p___argc.MSVCRT ref: 004080A5
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6FA10EF0,00000000,?,004081B2), ref: 004080DC
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2194999882.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.2194970989.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195017472.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195034064.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195088572.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000006.00000002.2195185959.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                            • String ID: mssecsvc2.1
                                            • API String ID: 4274534310-2839763450
                                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                            Execution Graph

                                            Execution Coverage:34.8%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:36
                                            Total number of Limit Nodes:2

                                            Callgraph

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                            • __p___argc.MSVCRT ref: 004080A5
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6FA10EF0,00000000,?,004081B2), ref: 004080DC
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2826560707.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000008.00000002.2826547496.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826574459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826632436.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826645281.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                            • String ID: mssecsvc2.1
                                            • API String ID: 4274534310-2839763450
                                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                            Control-flow Graph

                                            APIs
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                            Strings
                                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2826560707.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000008.00000002.2826547496.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826574459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826632436.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826645281.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                            • API String ID: 774561529-2614457033
                                            • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                            • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                            • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                            • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                            Control-flow Graph

                                            APIs
                                            • sprintf.MSVCRT ref: 00407C56
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FA10EF0,00000000), ref: 00407C9B
                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2826560707.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000008.00000002.2826547496.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826574459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826632436.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826645281.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                            • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                            • API String ID: 3340711343-2450984573
                                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FA10EF0,?,00000000), ref: 00407CEF
                                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                            • sprintf.MSVCRT ref: 00407E01
                                            • sprintf.MSVCRT ref: 00407E18
                                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2826560707.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000008.00000002.2826547496.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826574459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826632436.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826645281.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                            • API String ID: 4072214828-1507730452
                                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2826560707.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000008.00000002.2826547496.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826574459.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826587169.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826619503.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826632436.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826645281.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000008.00000002.2826719337.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                            • String ID:
                                            • API String ID: 801014965-0
                                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59