Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Z6oBXEnHSp

Overview

General Information

Sample Name:Z6oBXEnHSp (renamed file extension from none to dll)
Analysis ID:670540
MD5:bde639535ef46919a0a79d41ab1c483a
SHA1:9db378550506f86c0fce1f6f85d76b87f7ab9b8b
SHA256:76eb7110003dfff98e44b6c83995a88b2e00b6b9f63593c5e7af3a16337f4b4a
Tags:dllOpenCTIBRSandboxed
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Wannacry ransomware
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Query firmware table information (likely to detect VMs)
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Connects to many IPs within the same subnet mask (likely port scanning)
Connects to many different private IPs (likely to spread or exploit)
Machine Learning detection for dropped file
Drops executables to the windows directory (C:\Windows) and starts them
Connects to many different private IPs via SMB (likely to spread or exploit)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Creates files inside the system directory
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Connects to several IPs in different countries
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Queries disk information (often used to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6252 cmdline: loaddll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 6260 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6280 cmdline: rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • mssecsvr.exe (PID: 6304 cmdline: C:\WINDOWS\mssecsvr.exe MD5: F1C071F699A3A98CF32A63603640DD63)
    • rundll32.exe (PID: 6268 cmdline: rundll32.exe C:\Users\user\Desktop\Z6oBXEnHSp.dll,PlayGame MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6408 cmdline: rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",PlayGame MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • mssecsvr.exe (PID: 6444 cmdline: C:\WINDOWS\mssecsvr.exe MD5: F1C071F699A3A98CF32A63603640DD63)
  • mssecsvr.exe (PID: 6428 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: F1C071F699A3A98CF32A63603640DD63)
  • svchost.exe (PID: 6460 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6516 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6712 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6884 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 7000 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 7064 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 9960 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 10072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 4660 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 8128 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3236 cmdline: C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5308 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4140 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 15132 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Z6oBXEnHSp.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
  • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
  • 0x353d0:$x3: tasksche.exe
  • 0x455e0:$x3: tasksche.exe
  • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
  • 0x45634:$x5: WNcry@2ol7
  • 0x353a8:$x8: C:\%s\qeriuwjhrf
  • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
  • 0x3014:$s1: C:\%s\%s
  • 0x12098:$s1: C:\%s\%s
  • 0x1b39c:$s1: C:\%s\%s
  • 0x353bc:$s1: C:\%s\%s
  • 0x45534:$s3: cmd.exe /c "%s"
  • 0x77a88:$s4: msg/m_portuguese.wnry
  • 0x326f0:$s5: \\192.168.56.20\IPC$
  • 0x1fae5:$s6: \\172.16.99.5\IPC$
  • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
  • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
  • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
  • 0x38b0a:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
  • 0x387e4:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
  • 0x383d0:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
Z6oBXEnHSp.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    Z6oBXEnHSp.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    C:\Windows\tasksche.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0xf4d8:$x3: tasksche.exe
    • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0xf52c:$x5: WNcry@2ol7
    • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0xf42c:$s3: cmd.exe /c "%s"
    • 0x41980:$s4: msg/m_portuguese.wnry
    • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
    • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
    • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
    C:\Windows\tasksche.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    C:\Windows\mssecsvr.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x3136c:$x3: tasksche.exe
    • 0x4157c:$x3: tasksche.exe
    • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x415d0:$x5: WNcry@2ol7
    • 0x31344:$x8: C:\%s\qeriuwjhrf
    • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0xe034:$s1: C:\%s\%s
    • 0x17338:$s1: C:\%s\%s
    • 0x31358:$s1: C:\%s\%s
    • 0x414d0:$s3: cmd.exe /c "%s"
    • 0x73a24:$s4: msg/m_portuguese.wnry
    • 0x2e68c:$s5: \\192.168.56.20\IPC$
    • 0x1ba81:$s6: \\172.16.99.5\IPC$
    • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    • 0x34aa6:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
    • 0x34780:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
    • 0x3436c:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
    C:\Windows\mssecsvr.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
    • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
    • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
    • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
    • 0x1d439:$s1: __TREEID__PLACEHOLDER__
    • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
    • 0x1f508:$s1: __TREEID__PLACEHOLDER__
    • 0x20570:$s1: __TREEID__PLACEHOLDER__
    • 0x215d8:$s1: __TREEID__PLACEHOLDER__
    • 0x22640:$s1: __TREEID__PLACEHOLDER__
    • 0x236a8:$s1: __TREEID__PLACEHOLDER__
    • 0x24710:$s1: __TREEID__PLACEHOLDER__
    • 0x25778:$s1: __TREEID__PLACEHOLDER__
    • 0x267e0:$s1: __TREEID__PLACEHOLDER__
    • 0x27848:$s1: __TREEID__PLACEHOLDER__
    • 0x288b0:$s1: __TREEID__PLACEHOLDER__
    • 0x29918:$s1: __TREEID__PLACEHOLDER__
    • 0x2a980:$s1: __TREEID__PLACEHOLDER__
    • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
    • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
    • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
    • 0x2e340:$s1: __TREEID__PLACEHOLDER__
    C:\Windows\mssecsvr.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      Click to see the 2 entries
      SourceRuleDescriptionAuthorStrings
      00000008.00000000.293236571.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000004.00000000.285972677.0000000000710000.00000002.00000001.01000000.00000004.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
      • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
      • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
      00000007.00000002.889387707.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000004.00000000.286498095.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000007.00000000.289744917.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            Click to see the 21 entries
            SourceRuleDescriptionAuthorStrings
            4.0.mssecsvr.exe.7100a4.5.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0xe8d8:$x3: tasksche.exe
            • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0xe92c:$x5: WNcry@2ol7
            • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0xe82c:$s3: cmd.exe /c "%s"
            • 0x1e02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x1adc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x16c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            4.0.mssecsvr.exe.7100a4.5.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            8.0.mssecsvr.exe.7100a4.5.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0xe8fc:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0xe8d8:$x3: tasksche.exe
            • 0xe8b4:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0xe92c:$x5: WNcry@2ol7
            • 0xe8fc:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0xe82c:$s3: cmd.exe /c "%s"
            • 0x1e02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x1adc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x16c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            8.0.mssecsvr.exe.7100a4.5.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
            • 0xe8d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
            • 0xe900:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
            8.0.mssecsvr.exe.7100a4.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
            • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
            • 0xf4d8:$x3: tasksche.exe
            • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
            • 0xf52c:$x5: WNcry@2ol7
            • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
            • 0xf42c:$s3: cmd.exe /c "%s"
            • 0x41980:$s4: msg/m_portuguese.wnry
            • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
            • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
            • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
            Click to see the 97 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Z6oBXEnHSp.dllVirustotal: Detection: 88%Perma Link
            Source: Z6oBXEnHSp.dllMetadefender: Detection: 78%Perma Link
            Source: Z6oBXEnHSp.dllReversingLabs: Detection: 90%
            Source: Z6oBXEnHSp.dllAvira: detected
            Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comURL Reputation: Label: malware
            Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/URL Reputation: Label: malware
            Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/:Avira URL Cloud: Label: malware
            Source: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/pAvira URL Cloud: Label: malware
            Source: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comVirustotal: Detection: 10%Perma Link
            Source: C:\Windows\mssecsvr.exeAvira: detection malicious, Label: TR/Ransom.Gen
            Source: C:\WINDOWS\qeriuwjhrf (copy)Virustotal: Detection: 67%Perma Link
            Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 71%
            Source: C:\Windows\mssecsvr.exeReversingLabs: Detection: 96%
            Source: C:\Windows\tasksche.exeReversingLabs: Detection: 71%
            Source: Z6oBXEnHSp.dllJoe Sandbox ML: detected
            Source: C:\Windows\mssecsvr.exeJoe Sandbox ML: detected
            Source: C:\Windows\tasksche.exeJoe Sandbox ML: detected
            Source: 8.2.mssecsvr.exe.400000.0.unpackAvira: Label: TR/Ransom.Gen
            Source: 8.0.mssecsvr.exe.400000.0.unpackAvira: Label: TR/Ransom.Gen
            Source: 4.0.mssecsvr.exe.400000.2.unpackAvira: Label: TR/Ransom.Gen
            Source: 4.2.mssecsvr.exe.400000.0.unpackAvira: Label: TR/Ransom.Gen
            Source: 7.0.mssecsvr.exe.400000.0.unpackAvira: Label: TR/Ransom.Gen
            Source: 4.0.mssecsvr.exe.400000.0.unpackAvira: Label: TR/Ransom.Gen
            Source: 4.0.mssecsvr.exe.400000.4.unpackAvira: Label: TR/Ransom.Gen
            Source: 8.0.mssecsvr.exe.400000.6.unpackAvira: Label: TR/Ransom.Gen
            Source: 8.0.mssecsvr.exe.400000.2.unpackAvira: Label: TR/Ransom.Gen
            Source: 8.0.mssecsvr.exe.400000.4.unpackAvira: Label: TR/Ransom.Gen
            Source: 7.2.mssecsvr.exe.400000.0.unpackAvira: Label: TR/Ransom.Gen
            Source: 4.0.mssecsvr.exe.400000.6.unpackAvira: Label: TR/Ransom.Gen

            Exploits

            barindex
            Source: global trafficTCP traffic: 192.168.2.148:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.149:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.146:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.147:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.140:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.141:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.144:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.145:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.142:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.143:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.159:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.157:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.158:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.151:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.152:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.150:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.155:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.156:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.153:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.154:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.126:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.247:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.127:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.248:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.124:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.245:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.125:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.246:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.128:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.249:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.129:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.240:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.122:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.243:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.123:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.244:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.120:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.241:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.121:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.242:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.137:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.138:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.135:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.136:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.139:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.250:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.130:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.251:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.133:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.254:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.134:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.131:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.252:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.132:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.253:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.225:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.226:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.223:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.224:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.229:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.227:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.228:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.221:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.222:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.220:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.115:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.236:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.116:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.237:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.234:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.235:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.119:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.117:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.238:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.118:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.239:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.232:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.233:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.230:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.231:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.203:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.204:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.201:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.202:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.207:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.208:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.205:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.206:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.200:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.209:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.214:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.215:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.212:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.213:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.218:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.219:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.216:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.217:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.210:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.211:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.180:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.181:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.184:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.185:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.182:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.183:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.188:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.189:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.186:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.187:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.191:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.192:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.190:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.195:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.196:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.193:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.194:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.199:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.197:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.198:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.168:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.169:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.162:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.163:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.160:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.161:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.166:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.167:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.164:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.165:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.170:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.179:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.173:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.174:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.171:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.172:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.177:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.178:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.175:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.176:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.148:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.149:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.146:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.147:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.140:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.141:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.144:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.145:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.142:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.143:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.159:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.157:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.158:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.151:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.152:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.150:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.155:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.156:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.153:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.154:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.126:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.247:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.127:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.248:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.124:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.245:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.125:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.246:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.128:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.249:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.129:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.240:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.122:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.243:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.123:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.244:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.120:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.241:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.121:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.242:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.137:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.138:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.135:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.136:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.139:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.250:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.130:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.251:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.133:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.254:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.134:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.131:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.252:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.132:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.253:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.225:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.226:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.223:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.224:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.229:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.227:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.228:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.221:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.222:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.220:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.115:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.236:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.116:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.237:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.234:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.114:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.235:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.119:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.117:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.238:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.118:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.239:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.232:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.233:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.230:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.231:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.203:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.204:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.201:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.202:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.207:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.208:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.205:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.206:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.200:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.209:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.214:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.215:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.212:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.213:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.218:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.219:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.216:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.217:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.210:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.211:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.180:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.181:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.184:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.185:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.182:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.183:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.188:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.189:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.186:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.187:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.191:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.192:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.190:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.195:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.196:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.193:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.194:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.199:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.197:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.198:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.168:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.169:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.162:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.163:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.160:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.161:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.166:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.167:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.164:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.165:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.170:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.179:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.173:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.174:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.171:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.172:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.177:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.178:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.175:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.176:445Jump to behavior
            Source: Z6oBXEnHSp.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: unknownHTTPS traffic detected: 20.190.159.70:443 -> 192.168.2.3:50214 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 204.79.197.200:443 -> 192.168.2.3:50240 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 204.79.197.200:443 -> 192.168.2.3:50239 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.106.135:443 -> 192.168.2.3:50242 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.106.135:443 -> 192.168.2.3:50241 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.205.181.161:443 -> 192.168.2.3:50816 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.108.18:443 -> 192.168.2.3:51030 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.108.18:443 -> 192.168.2.3:51029 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51602 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51604 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51606 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51603 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51605 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:53568 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:53692 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:53758 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.238.103.94:443 -> 192.168.2.3:53823 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:53822 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.242.101.226:443 -> 192.168.2.3:53901 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.242.101.226:443 -> 192.168.2.3:53967 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54041 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.242.101.226:443 -> 192.168.2.3:54109 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54198 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54258 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54342 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54397 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54521 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54568 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54675 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54833 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54899 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.190.159.22:443 -> 192.168.2.3:49562 version: TLS 1.2

            Networking

            barindex
            Source: global trafficTCP traffic: Count: 166 IPs: 2.60.3.2,2.60.3.1,2.60.3.101,2.60.3.100,2.60.3.38,2.60.3.39,2.60.3.34,2.60.3.35,2.60.3.36,2.60.3.37,2.60.3.30,2.60.3.31,2.60.3.32,2.60.3.33,2.60.3.27,2.60.3.28,2.60.3.29,2.60.3.23,2.60.3.24,2.60.3.25,2.60.3.26,2.60.3.20,2.60.3.21,2.60.3.22,2.60.3.92,2.60.3.93,2.60.3.94,2.60.3.95,2.60.3.90,2.60.3.91,2.60.3.121,2.60.3.120,2.60.3.123,2.60.3.122,2.60.3.114,2.60.3.113,2.60.3.116,2.60.3.115,2.60.3.16,2.60.3.118,2.60.3.17,2.60.3.117,2.60.3.18,2.60.3.19,2.60.3.119,2.60.3.12,2.60.3.13,2.60.3.14,2.60.3.15,2.60.3.96,2.60.3.97,2.60.3.10,2.60.3.98,2.60.3.11,2.60.3.99,2.60.3.81,2.60.3.82,2.60.3.83,2.60.3.84,2.60.3.80,2.60.3.110,2.60.3.112,2.60.3.111,2.60.3.103,2.60.3.102,2.60.3.105,2.60.3.104,2.60.3.107,2.60.3.106,2.60.3.109,2.60.3.108,2.60.3.4,2.60.3.89,2.60.3.3,2.60.3.6,2.60.3.5,2.60.3.8,2.60.3.85,2.60.3.7,2.60.3.86,2.60.3.87,2.60.3.9,2.60.3.88,2.60.3.70,2.60.3.71,2.60.3.72,2.60.3.73,2.60.3.141,2.60.3.140,2.60.3.143,2.60.3.142,2.60.3.145,2.60.3.144,2.60.3.136,2.60.3.135,2.60.3.138,2.60.3.137,2.60.3.139,2.60.3.78,2.60.3.79,2.60.3.74,2.60.3.75,2.60.3.76,2.60.3.77,2.60.3.60,2.60.3.61,2.60.3.62,2.60.3.130,2.60.3.132,2.60.3.131,2.60.3.134,2.60.3.133,2.60.3.125,2.60.3.124,2.60.3.127,2.60.3.126,2.60.3.129,2.60.3.128,2.60.3.67,2.60.3.68,2.60.3.69,2.60.3.63,2.60.3.64,2.60.3.65,2.60.3.66,2.60.3.50,2.60.3.51,2.60.3.161,2.60.3.160,2.60.3.163,2.60.3.162,2.60.3.165,2.60.3.164,2.60.3.166,2.60.3.158,2.60.3.157,2.60.3.159,2.60.3.56,2.60.3.57,2.60.3.58,2.60.3.59,2.60.3.52,2.60.3.53,2.60.3.54,2.60.3.55,2.60.3.40,2.60.3.150,2.60.3.152,2.60.3.151,2.60.3.154,2.60.3.153,2.60.3.156,2.60.3.155,2.60.3.147,2.60.3.146,2.60.3.149,2.60.3.148,2.60.3.49,2.60.3.45,2.60.3.46,2.60.3.47,2.60.3.48,2.60.3.41,2.60.3.42,2.60.3.43,2.60.3.44
            Source: global trafficTCP traffic: Count: 56 IPs: 47.254.5.19,47.254.5.18,47.254.5.11,47.254.5.55,47.254.5.10,47.254.5.54,47.254.5.13,47.254.5.12,47.254.5.15,47.254.5.14,47.254.5.17,47.254.5.16,47.254.5.20,47.254.5.29,47.254.5.22,47.254.5.21,47.254.5.24,47.254.5.23,47.254.5.26,47.254.5.25,47.254.5.28,47.254.5.27,47.254.5.31,47.254.5.30,47.254.5.33,47.254.5.32,47.254.5.35,47.254.5.34,47.254.5.37,47.254.5.36,47.254.5.39,47.254.5.38,47.254.5.208,47.254.5.40,47.254.5.42,47.254.5.9,47.254.5.41,47.254.5.8,47.254.5.7,47.254.5.6,47.254.5.5,47.254.5.4,47.254.5.3,47.254.5.2,47.254.5.1,47.254.5.44,47.254.5.43,47.254.5.46,47.254.5.45,47.254.5.48,47.254.5.47,47.254.5.49,47.254.5.51,47.254.5.50,47.254.5.53,47.254.5.52
            Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 3592Host: login.live.com
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 3592Host: login.live.com
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4740Host: login.live.com
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4794Host: login.live.com
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4796Host: login.live.com
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4796Host: login.live.com
            Source: global trafficHTTP traffic detected: GET /client/config?cc=US&setlang=en-US HTTP/1.1X-Search-CortanaAvailableCapabilities: CortanaExperience,SpeechLanguageX-Search-SafeSearch: ModerateAccept-Encoding: gzip, deflateX-Device-MachineId: {A2AB526A-D38D-4FC9-8BA0-E34B8D6354E8}X-UserAgeClass: UnknownX-BM-Market: USX-BM-DateFormat: M/d/yyyyX-CortanaAccessAboveLock: falseX-Device-OSSKU: 48X-BM-DTZ: -420X-BM-FirstEnabledTime: 132061295966656129X-DeviceID: 0100748C09004E33X-Search-TimeZone: Bias=480; DaylightBias=-60; TimeZoneKeyName=Pacific Standard TimeX-BM-Theme: 000000;0078d7X-Search-RPSToken: t%3DEwDYAkR8BAAUcvamItSE/vUHpyZRp3BeyOJPQDsAARIeoqvffg5e9Dk7gpLhn%2BJeo1pbuwQmYDlLI%2B8CCVsuqAH3NsLHvQ/bTsnJRIvDTHJLA/lX1XyF9SOUWKUwidLtPuOgGl2veWu7Je3pA5irz/k5UurDLRMPQiJxLsMlCI7jcc8sysxClgVvP5FHbQMgS5XroFCigIeDlLmV7FAKeQbtjOyMTWqV/sdUgnhcglc2t%2B5s6fQbDgO%2BqCBtP0PM8lkk8y7P5wSZiteBQk4MqU%2BHPlb9w5hrOnCvvqS2VVqWFa/ZjH1OSe4cc%2B4hmH5ncrRtY2kZos3WWhO7SzJDVSrINvJyZSSHNEBQ0FA8xiy7C19a8jEcqutxevucqQEDZgAACPcv9Hy4TDx9qAHGu/marjjAT87VBjfsQXhPj/K2duAJ3ey5jqhh3bDvUDssc6hFOfRV%2BcXP1R7P7BPu%2ByD3rzOEClsf%2BTqpUBczRoyIBCFmi0pFZh9JpXYddyZcnxLUTlAHrvY/zhVe0CGsxrhSknPvHcw4Wn8jKumgaVirJ2B8Lhmx4m6lf3cqjU3bHx4UrXIlbGSxuo3Me1ZsdPXGLjFYPM3uq0qWrkBbG7cFbqVEBx2QnjkPNUiImtKXW0rmq0ZY85F4ua7C%2BYPeP/p/LVWt%2Bky0F2eiuPwd80IhJEEAx7ArKj1XWO9Rb2ma1xNORu6JlsM6MAff7Ej9iGG81K8cU35dZiUgOoNH1%2BNHCUEXXVZJwLAXi5XXkaBuBqOQ/iuhdRI/LPi7XuS2MiFAtHCKV%2B1F/gir34JqFFTExEHR9SX/qfbr7ti9uWqHWV8ovHJOyTfexQj/9NxviBpm9CkMeIwuR/MFhsHaFvoaCSXZ1%2BX5tGPn/vsHT1en97Zhncad9Y4kJBzKl9hzPrMJBlZ1zBeDOcjh6UCgbCC7MDAYG2pIo%2BMe4zIh2dILgs5%2Bbn/91gE%3D%26p%3DX-Agent-DeviceId: 0100748C09004E33X-BM-CBT: 1658390270User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.10.7.17134; 10.0.0.0.17134.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134X-Device-isOptin: trueAccept-language: en-US, enX-Device-Touch: falseX-Device-ClientSession: D6CF687A05A7485D801404895863F4CCX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-BM-ClientFeatures: pbitcpdisabled,AmbientWidescreen,rs1musicprod,CortanaSPAXamlHeaderHost: www.bing.comConnection: Keep-AliveCookie: MUID=1E17B9B70E9B4C6E957D159ED3646FFF
            Source: global trafficHTTP traffic detected: GET /proactive/v2/spark?cc=US&setLang=en-US HTTP/1.1X-Search-CortanaAvailableCapabilities: CortanaExperience,SpeechLanguageX-Search-SafeSearch: ModerateAccept-Encoding: gzip, deflateX-Device-MachineId: {A2AB526A-D38D-4FC9-8BA0-E34B8D6354E8}X-Device-IsBatteryCertified: falseX-UserAgeClass: UnknownX-BM-Market: USX-BM-DateFormat: M/d/yyyyX-CortanaAccessAboveLock: falseX-Device-OSSKU: 48X-Device-IsBatteryEnabled: falseX-Device-NetworkType: ethernetX-BM-DTZ: -420X-BM-FirstEnabledTime: 132061295966656129X-DeviceID: 0100748C09004E33X-VoiceActivationOn: falseX-Device-AudioCapture: Microphone (High Definition Audio Device)X-Search-TimeZone: Bias=480; DaylightBias=-60; TimeZoneKeyName=Pacific Standard TimeX-BM-Theme: 000000;0078d7X-Search-RPSToken: t%3DEwDYAkR8BAAUcvamItSE/vUHpyZRp3BeyOJPQDsAARIeoqvffg5e9Dk7gpLhn%2BJeo1pbuwQmYDlLI%2B8CCVsuqAH3NsLHvQ/bTsnJRIvDTHJLA/lX1XyF9SOUWKUwidLtPuOgGl2veWu7Je3pA5irz/k5UurDLRMPQiJxLsMlCI7jcc8sysxClgVvP5FHbQMgS5XroFCigIeDlLmV7FAKeQbtjOyMTWqV/sdUgnhcglc2t%2B5s6fQbDgO%2BqCBtP0PM8lkk8y7P5wSZiteBQk4MqU%2BHPlb9w5hrOnCvvqS2VVqWFa/ZjH1OSe4cc%2B4hmH5ncrRtY2kZos3WWhO7SzJDVSrINvJyZSSHNEBQ0FA8xiy7C19a8jEcqutxevucqQEDZgAACPcv9Hy4TDx9qAHGu/marjjAT87VBjfsQXhPj/K2duAJ3ey5jqhh3bDvUDssc6hFOfRV%2BcXP1R7P7BPu%2ByD3rzOEClsf%2BTqpUBczRoyIBCFmi0pFZh9JpXYddyZcnxLUTlAHrvY/zhVe0CGsxrhSknPvHcw4Wn8jKumgaVirJ2B8Lhmx4m6lf3cqjU3bHx4UrXIlbGSxuo3Me1ZsdPXGLjFYPM3uq0qWrkBbG7cFbqVEBx2QnjkPNUiImtKXW0rmq0ZY85F4ua7C%2BYPeP/p/LVWt%2Bky0F2eiuPwd80IhJEEAx7ArKj1XWO9Rb2ma1xNORu6JlsM6MAff7Ej9iGG81K8cU35dZiUgOoNH1%2BNHCUEXXVZJwLAXi5XXkaBuBqOQ/iuhdRI/LPi7XuS2MiFAtHCKV%2B1F/gir34JqFFTExEHR9SX/qfbr7ti9uWqHWV8ovHJOyTfexQj/9NxviBpm9CkMeIwuR/MFhsHaFvoaCSXZ1%2BX5tGPn/vsHT1en97Zhncad9Y4kJBzKl9hzPrMJBlZ1zBeDOcjh6UCgbCC7MDAYG2pIo%2BMe4zIh2dILgs5%2Bbn/91gE%3D%26p%3DX-Agent-DeviceId: 0100748C09004E33X-BM-CBT: 1658390270User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.10.7.17134; 10.0.0.0.17134.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134X-Device-isOptin: trueAccept-language: en-US, enX-Device-IsEnergyHero: falseX-Device-Touch: falseX-Device-ClientSession: D6CF687A05A7485D801404895863F4CCX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-BM-ClientFeatures: pbitcpdisabled,AmbientWidescreen,rs1musicprod,CortanaSPAXamlHeaderHost: www.bing.comConnection: Keep-AliveCookie: MUID=1E17B9B70E9B4C6E957D159ED3646FFF
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4XJ83?ver=b124 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE50Fei?ver=2ac1 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4Pwej?ver=cbf0 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4PlTB?ver=2a94 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE50HTY?ver=bda9 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4XLNP?ver=32e3 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4683Host: login.live.com
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4683Host: login.live.com
            Source: global trafficHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 4683Host: login.live.com
            Source: unknownNetwork traffic detected: IP country count 24
            Source: unknownDNS traffic detected: query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com replaycode: Server failure (2)
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51029
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53967
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50217
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53966
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 53967 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50219
            Source: unknownNetwork traffic detected: HTTP traffic on port 51602 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54106 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54258
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54257
            Source: unknownNetwork traffic detected: HTTP traffic on port 51029 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53568
            Source: unknownNetwork traffic detected: HTTP traffic on port 54760 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54899
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50214
            Source: unknownNetwork traffic detected: HTTP traffic on port 54093 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53962
            Source: unknownNetwork traffic detected: HTTP traffic on port 57178 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57377
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57015
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51030
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53692
            Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54568 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 57264 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54044 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54258 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
            Source: unknownNetwork traffic detected: HTTP traffic on port 51605 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52365
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
            Source: unknownNetwork traffic detected: HTTP traffic on port 57100 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53970
            Source: unknownNetwork traffic detected: HTTP traffic on port 53758 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53962 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54034
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54397
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57264
            Source: unknownNetwork traffic detected: HTTP traffic on port 56987 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54198 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51603
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51604
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53902
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53901
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51602
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50239
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51605
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49562
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51606
            Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54397 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54675
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50232
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50234
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50233
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54712
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54833
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54711
            Source: unknownNetwork traffic detected: HTTP traffic on port 51919 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54039
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54041
            Source: unknownNetwork traffic detected: HTTP traffic on port 53898 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56981
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54044
            Source: unknownNetwork traffic detected: HTTP traffic on port 54675 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53823 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 57356 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53758
            Source: unknownNetwork traffic detected: HTTP traffic on port 53970 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54176 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54109 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 51603 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53890 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 57169 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50241
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56987
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50240
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56900
            Source: unknownNetwork traffic detected: HTTP traffic on port 56915 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50242
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53991
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54568
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56985
            Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57169
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54210
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57283
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54176
            Source: unknownNetwork traffic detected: HTTP traffic on port 57076 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 57351 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53763 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54041 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53692 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 56985 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 51606 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 57225 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56915
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50816
            Source: unknownNetwork traffic detected: HTTP traffic on port 54257 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53763
            Source: unknownNetwork traffic detected: HTTP traffic on port 54039 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53831 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53902 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54183 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56994
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57445
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54183
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57178
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54342
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53890
            Source: unknownNetwork traffic detected: HTTP traffic on port 54899 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 56894 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57171
            Source: unknownNetwork traffic detected: HTTP traffic on port 57283 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 57377 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54833 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54109
            Source: unknownNetwork traffic detected: HTTP traffic on port 57085 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49562 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53895
            Source: unknownNetwork traffic detected: HTTP traffic on port 54111 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53966 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53898
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54106
            Source: unknownNetwork traffic detected: HTTP traffic on port 56994 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52365 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57100
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56894
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54111
            Source: unknownNetwork traffic detected: HTTP traffic on port 50816 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54198
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51919
            Source: unknownNetwork traffic detected: HTTP traffic on port 53568 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53822 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53895 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53823
            Source: unknownNetwork traffic detected: HTTP traffic on port 57445 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 51604 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53827
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54753
            Source: unknownNetwork traffic detected: HTTP traffic on port 57015 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 57361 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53822
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57225
            Source: unknownNetwork traffic detected: HTTP traffic on port 50217 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53827 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54034 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57356
            Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54760
            Source: unknownNetwork traffic detected: HTTP traffic on port 56900 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57076
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57351
            Source: unknownNetwork traffic detected: HTTP traffic on port 53991 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54210 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54342 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 51030 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54753 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54246
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54521
            Source: unknownNetwork traffic detected: HTTP traffic on port 53901 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53831
            Source: unknownNetwork traffic detected: HTTP traffic on port 50239 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54093
            Source: unknownNetwork traffic detected: HTTP traffic on port 54246 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 54521 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57085
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57361
            Source: unknownNetwork traffic detected: HTTP traffic on port 57171 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 56981 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 443
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
            Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
            Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
            Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
            Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
            Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.4
            Source: unknownTCP traffic detected without corresponding DNS query: 188.0.142.229
            Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
            Source: unknownTCP traffic detected without corresponding DNS query: 200.51.104.228
            Source: unknownTCP traffic detected without corresponding DNS query: 176.86.164.69
            Source: unknownTCP traffic detected without corresponding DNS query: 128.77.168.103
            Source: unknownTCP traffic detected without corresponding DNS query: 44.50.252.162
            Source: unknownTCP traffic detected without corresponding DNS query: 207.220.133.127
            Source: unknownTCP traffic detected without corresponding DNS query: 121.249.172.184
            Source: unknownTCP traffic detected without corresponding DNS query: 164.115.125.222
            Source: unknownTCP traffic detected without corresponding DNS query: 67.234.185.22
            Source: unknownTCP traffic detected without corresponding DNS query: 78.145.173.244
            Source: unknownTCP traffic detected without corresponding DNS query: 186.150.78.240
            Source: unknownTCP traffic detected without corresponding DNS query: 122.242.196.126
            Source: unknownTCP traffic detected without corresponding DNS query: 57.185.130.109
            Source: unknownTCP traffic detected without corresponding DNS query: 102.45.129.73
            Source: unknownTCP traffic detected without corresponding DNS query: 152.191.29.51
            Source: unknownTCP traffic detected without corresponding DNS query: 11.150.50.225
            Source: unknownTCP traffic detected without corresponding DNS query: 177.236.59.220
            Source: unknownTCP traffic detected without corresponding DNS query: 166.63.117.218
            Source: unknownTCP traffic detected without corresponding DNS query: 151.159.186.103
            Source: unknownTCP traffic detected without corresponding DNS query: 21.134.222.80
            Source: unknownTCP traffic detected without corresponding DNS query: 101.216.167.182
            Source: unknownTCP traffic detected without corresponding DNS query: 124.222.137.106
            Source: unknownTCP traffic detected without corresponding DNS query: 217.84.140.113
            Source: svchost.exe, 00000021.00000003.580976659.0000013310F81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-20T13:21:02.8104380Z||.||4998f0a4-af49-449b-82d0-89396bef82ff||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
            Source: svchost.exe, 00000021.00000003.580976659.0000013310F81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-20T13:21:02.8104380Z||.||4998f0a4-af49-449b-82d0-89396bef82ff||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
            Source: svchost.exe, 00000021.00000003.580976659.0000013310F81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0010"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Ca equals www.facebook.com (Facebook)
            Source: svchost.exe, 00000021.00000003.580976659.0000013310F81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0010"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Ca equals www.twitter.com (Twitter)
            Source: svchost.exe, 00000011.00000002.674149862.000002163069D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.631337597.0000013310F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: svchost.exe, 00000011.00000002.673757397.0000021630600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
            Source: svchost.exe, 00000021.00000003.601013287.0000013310FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
            Source: svchost.exe, 0000000D.00000002.322526100.0000019C88013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
            Source: mssecsvr.exe.2.drString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
            Source: mssecsvr.exe, 00000007.00000003.294129620.0000000000C67000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.300222658.0000000000C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
            Source: mssecsvr.exe, 00000007.00000003.294129620.0000000000C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/:
            Source: mssecsvr.exe, 00000008.00000002.300222658.0000000000C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/p
            Source: mssecsvr.exe, 00000007.00000002.888903240.000000000019C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
            Source: svchost.exe, 0000000D.00000003.322133727.0000019C8805C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 0000000D.00000002.322604518.0000019C8805E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322133727.0000019C8805C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
            Source: svchost.exe, 0000000D.00000002.322561212.0000019C8803C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
            Source: svchost.exe, 0000000D.00000002.322604518.0000019C8805E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322133727.0000019C8805C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
            Source: svchost.exe, 0000000D.00000002.322585925.0000019C8804D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322120077.0000019C88047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
            Source: svchost.exe, 0000000D.00000002.322604518.0000019C8805E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322133727.0000019C8805C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
            Source: svchost.exe, 0000000D.00000002.322561212.0000019C8803C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
            Source: svchost.exe, 0000000D.00000003.322150978.0000019C8803F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322176254.0000019C88041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.322569337.0000019C88042000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
            Source: svchost.exe, 0000000D.00000003.322150978.0000019C8803F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322176254.0000019C88041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.322569337.0000019C88042000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
            Source: svchost.exe, 0000000D.00000002.322598610.0000019C88058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322160629.0000019C88057000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322150978.0000019C8803F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
            Source: svchost.exe, 00000021.00000003.601013287.0000013310FA3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.606430739.0000013310F6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
            Source: svchost.exe, 0000000D.00000003.322133727.0000019C8805C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
            Source: svchost.exe, 0000000D.00000002.322598610.0000019C88058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322160629.0000019C88057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
            Source: svchost.exe, 0000000D.00000002.322598610.0000019C88058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322160629.0000019C88057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
            Source: svchost.exe, 0000000D.00000003.322167876.0000019C88056000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
            Source: svchost.exe, 0000000D.00000003.322106268.0000019C88061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
            Source: svchost.exe, 0000000D.00000002.322561212.0000019C8803C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 0000000D.00000003.300425871.0000019C88031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
            Source: svchost.exe, 00000021.00000003.595923443.0000013311402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.595873295.0000013310F9D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.595894114.0000013310FAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
            Source: svchost.exe, 0000000D.00000003.322150978.0000019C8803F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.322565813.0000019C88040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
            Source: svchost.exe, 0000000D.00000002.322561212.0000019C8803C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.322526100.0000019C88013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
            Source: svchost.exe, 0000000D.00000003.322150978.0000019C8803F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
            Source: svchost.exe, 0000000D.00000003.322167876.0000019C88056000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
            Source: svchost.exe, 0000000D.00000003.322150978.0000019C8803F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
            Source: svchost.exe, 0000000D.00000002.322557168.0000019C8803A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.300425871.0000019C88031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
            Source: svchost.exe, 0000000D.00000002.322585925.0000019C8804D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000003.322120077.0000019C88047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
            Source: svchost.exe, 00000021.00000003.601013287.0000013310FA3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.606430739.0000013310F6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
            Source: svchost.exe, 00000021.00000003.601013287.0000013310FA3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.606430739.0000013310F6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
            Source: svchost.exe, 00000021.00000003.595923443.0000013311402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.595873295.0000013310F9D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.595894114.0000013310FAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
            Source: svchost.exe, 00000021.00000003.595923443.0000013311402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.595873295.0000013310F9D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.595894114.0000013310FAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
            Source: svchost.exe, 00000021.00000003.606512100.0000013310FB9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.606528153.0000013310FA3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.606558235.0000013311402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.606430739.0000013310F6F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.606484823.0000013310FB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
            Source: unknownHTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 18.10.0.17134.0.0; IDCRL-cfg 16.000.29158.8; App svchost.exe, 10.0.17134.1, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 3592Host: login.live.com
            Source: unknownDNS traffic detected: queries for: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
            Source: global trafficHTTP traffic detected: GET /v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=314559&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&ctry=US&time=20220308T163204Z&lc=en-US&pl=en-US&idtp=mid&uid=4388269c-b420-4134-ac19-bc7ca8a19ac1&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=fa70be57f3c840939976a5e0dd73f1c2&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1418352&metered=false&nettype=ethernet&npid=sc-314559&oemName=VMware%2C%20Inc.&oemid=VMware%2C%20Inc.&ossku=Professional&smBiosDm=VMware7%2C1&tl=2&tsu=1418352&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing= HTTP/1.1Accept-Encoding: gzip, deflateX-SDK-CACHE: chs=0&imp=0&chf=0&ds=50583&fs=32319&sc=6Cache-Control: no-cacheMS-CV: ceIObrY/uU+o2lOk.0User-Agent: WindowsShellClient/9.0.40929.0 (Windows)X-SDK-HWF: tch0,m301,m751,mA01,mT01Host: arc.msn.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=310091&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&ctry=US&time=20220308T163204Z&lc=en-US&pl=en-US&idtp=mid&uid=4388269c-b420-4134-ac19-bc7ca8a19ac1&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=30ef678fbe4f4110b514ac8c9328d3ac&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1418352&metered=false&nettype=ethernet&npid=sc-310091&oemName=VMware%2C%20Inc.&oemid=VMware%2C%20Inc.&ossku=Professional&rver=2&smBiosDm=VMware7%2C1&tl=2&tsu=1418352&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing= HTTP/1.1Accept-Encoding: gzip, deflateX-SDK-CACHE: chs=0&imp=0&chf=0&ds=50583&fs=32319&sc=6Cache-Control: no-cacheMS-CV: ceIObrY/uU+o2lOk.0User-Agent: WindowsShellClient/9.0.40929.0 (Windows)X-SDK-HWF: tch0,m301,m751,mA01,mT01Host: arc.msn.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /client/config?cc=US&setlang=en-US HTTP/1.1X-Search-CortanaAvailableCapabilities: CortanaExperience,SpeechLanguageX-Search-SafeSearch: ModerateAccept-Encoding: gzip, deflateX-Device-MachineId: {A2AB526A-D38D-4FC9-8BA0-E34B8D6354E8}X-UserAgeClass: UnknownX-BM-Market: USX-BM-DateFormat: M/d/yyyyX-CortanaAccessAboveLock: falseX-Device-OSSKU: 48X-BM-DTZ: -420X-BM-FirstEnabledTime: 132061295966656129X-DeviceID: 0100748C09004E33X-Search-TimeZone: Bias=480; DaylightBias=-60; TimeZoneKeyName=Pacific Standard TimeX-BM-Theme: 000000;0078d7X-Search-RPSToken: t%3DEwDYAkR8BAAUcvamItSE/vUHpyZRp3BeyOJPQDsAARIeoqvffg5e9Dk7gpLhn%2BJeo1pbuwQmYDlLI%2B8CCVsuqAH3NsLHvQ/bTsnJRIvDTHJLA/lX1XyF9SOUWKUwidLtPuOgGl2veWu7Je3pA5irz/k5UurDLRMPQiJxLsMlCI7jcc8sysxClgVvP5FHbQMgS5XroFCigIeDlLmV7FAKeQbtjOyMTWqV/sdUgnhcglc2t%2B5s6fQbDgO%2BqCBtP0PM8lkk8y7P5wSZiteBQk4MqU%2BHPlb9w5hrOnCvvqS2VVqWFa/ZjH1OSe4cc%2B4hmH5ncrRtY2kZos3WWhO7SzJDVSrINvJyZSSHNEBQ0FA8xiy7C19a8jEcqutxevucqQEDZgAACPcv9Hy4TDx9qAHGu/marjjAT87VBjfsQXhPj/K2duAJ3ey5jqhh3bDvUDssc6hFOfRV%2BcXP1R7P7BPu%2ByD3rzOEClsf%2BTqpUBczRoyIBCFmi0pFZh9JpXYddyZcnxLUTlAHrvY/zhVe0CGsxrhSknPvHcw4Wn8jKumgaVirJ2B8Lhmx4m6lf3cqjU3bHx4UrXIlbGSxuo3Me1ZsdPXGLjFYPM3uq0qWrkBbG7cFbqVEBx2QnjkPNUiImtKXW0rmq0ZY85F4ua7C%2BYPeP/p/LVWt%2Bky0F2eiuPwd80IhJEEAx7ArKj1XWO9Rb2ma1xNORu6JlsM6MAff7Ej9iGG81K8cU35dZiUgOoNH1%2BNHCUEXXVZJwLAXi5XXkaBuBqOQ/iuhdRI/LPi7XuS2MiFAtHCKV%2B1F/gir34JqFFTExEHR9SX/qfbr7ti9uWqHWV8ovHJOyTfexQj/9NxviBpm9CkMeIwuR/MFhsHaFvoaCSXZ1%2BX5tGPn/vsHT1en97Zhncad9Y4kJBzKl9hzPrMJBlZ1zBeDOcjh6UCgbCC7MDAYG2pIo%2BMe4zIh2dILgs5%2Bbn/91gE%3D%26p%3DX-Agent-DeviceId: 0100748C09004E33X-BM-CBT: 1658390270User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.10.7.17134; 10.0.0.0.17134.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134X-Device-isOptin: trueAccept-language: en-US, enX-Device-Touch: falseX-Device-ClientSession: D6CF687A05A7485D801404895863F4CCX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-BM-ClientFeatures: pbitcpdisabled,AmbientWidescreen,rs1musicprod,CortanaSPAXamlHeaderHost: www.bing.comConnection: Keep-AliveCookie: MUID=1E17B9B70E9B4C6E957D159ED3646FFF
            Source: global trafficHTTP traffic detected: GET /proactive/v2/spark?cc=US&setLang=en-US HTTP/1.1X-Search-CortanaAvailableCapabilities: CortanaExperience,SpeechLanguageX-Search-SafeSearch: ModerateAccept-Encoding: gzip, deflateX-Device-MachineId: {A2AB526A-D38D-4FC9-8BA0-E34B8D6354E8}X-Device-IsBatteryCertified: falseX-UserAgeClass: UnknownX-BM-Market: USX-BM-DateFormat: M/d/yyyyX-CortanaAccessAboveLock: falseX-Device-OSSKU: 48X-Device-IsBatteryEnabled: falseX-Device-NetworkType: ethernetX-BM-DTZ: -420X-BM-FirstEnabledTime: 132061295966656129X-DeviceID: 0100748C09004E33X-VoiceActivationOn: falseX-Device-AudioCapture: Microphone (High Definition Audio Device)X-Search-TimeZone: Bias=480; DaylightBias=-60; TimeZoneKeyName=Pacific Standard TimeX-BM-Theme: 000000;0078d7X-Search-RPSToken: t%3DEwDYAkR8BAAUcvamItSE/vUHpyZRp3BeyOJPQDsAARIeoqvffg5e9Dk7gpLhn%2BJeo1pbuwQmYDlLI%2B8CCVsuqAH3NsLHvQ/bTsnJRIvDTHJLA/lX1XyF9SOUWKUwidLtPuOgGl2veWu7Je3pA5irz/k5UurDLRMPQiJxLsMlCI7jcc8sysxClgVvP5FHbQMgS5XroFCigIeDlLmV7FAKeQbtjOyMTWqV/sdUgnhcglc2t%2B5s6fQbDgO%2BqCBtP0PM8lkk8y7P5wSZiteBQk4MqU%2BHPlb9w5hrOnCvvqS2VVqWFa/ZjH1OSe4cc%2B4hmH5ncrRtY2kZos3WWhO7SzJDVSrINvJyZSSHNEBQ0FA8xiy7C19a8jEcqutxevucqQEDZgAACPcv9Hy4TDx9qAHGu/marjjAT87VBjfsQXhPj/K2duAJ3ey5jqhh3bDvUDssc6hFOfRV%2BcXP1R7P7BPu%2ByD3rzOEClsf%2BTqpUBczRoyIBCFmi0pFZh9JpXYddyZcnxLUTlAHrvY/zhVe0CGsxrhSknPvHcw4Wn8jKumgaVirJ2B8Lhmx4m6lf3cqjU3bHx4UrXIlbGSxuo3Me1ZsdPXGLjFYPM3uq0qWrkBbG7cFbqVEBx2QnjkPNUiImtKXW0rmq0ZY85F4ua7C%2BYPeP/p/LVWt%2Bky0F2eiuPwd80IhJEEAx7ArKj1XWO9Rb2ma1xNORu6JlsM6MAff7Ej9iGG81K8cU35dZiUgOoNH1%2BNHCUEXXVZJwLAXi5XXkaBuBqOQ/iuhdRI/LPi7XuS2MiFAtHCKV%2B1F/gir34JqFFTExEHR9SX/qfbr7ti9uWqHWV8ovHJOyTfexQj/9NxviBpm9CkMeIwuR/MFhsHaFvoaCSXZ1%2BX5tGPn/vsHT1en97Zhncad9Y4kJBzKl9hzPrMJBlZ1zBeDOcjh6UCgbCC7MDAYG2pIo%2BMe4zIh2dILgs5%2Bbn/91gE%3D%26p%3DX-Agent-DeviceId: 0100748C09004E33X-BM-CBT: 1658390270User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.10.7.17134; 10.0.0.0.17134.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134X-Device-isOptin: trueAccept-language: en-US, enX-Device-IsEnergyHero: falseX-Device-Touch: falseX-Device-ClientSession: D6CF687A05A7485D801404895863F4CCX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-BM-ClientFeatures: pbitcpdisabled,AmbientWidescreen,rs1musicprod,CortanaSPAXamlHeaderHost: www.bing.comConnection: Keep-AliveCookie: MUID=1E17B9B70E9B4C6E957D159ED3646FFF
            Source: global trafficHTTP traffic detected: GET /v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=280815&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&ctry=US&time=20220721T075834Z&lc=en-US&pl=en-US&idtp=mid&uid=4388269c-b420-4134-ac19-bc7ca8a19ac1&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=0167a4c2be024b62b353af57206d21be&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1612238&metered=false&nettype=ethernet&npid=sc-280815&oemName=bugvnb%2C%20Inc.&oemid=bugvnb%2C%20Inc.&ossku=Professional&smBiosDm=bugvnb7%2C1&tl=2&tsu=1612238&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing= HTTP/1.1Accept-Encoding: gzip, deflateX-SDK-CACHE: chs=0&imp=0&chf=0&ds=50583&fs=32319&sc=6Cache-Control: no-cacheMS-CV: WnmUCezSP0+2kxjF.0User-Agent: WindowsShellClient/9.0.40929.0 (Windows)X-SDK-HWF: tch0,m301,m751,mA01,mT01Host: arc.msn.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=338389&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&ctry=US&time=20220721T075834Z&lc=en-US&pl=en-US&idtp=mid&uid=4388269c-b420-4134-ac19-bc7ca8a19ac1&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=296dc433f6b54de9804878b624c31b79&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1612238&metered=false&nettype=ethernet&npid=sc-338389&oemName=bugvnb%2C%20Inc.&oemid=bugvnb%2C%20Inc.&ossku=Professional&smBiosDm=bugvnb7%2C1&tl=2&tsu=1612238&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing= HTTP/1.1Accept-Encoding: gzip, deflateX-SDK-CACHE: chs=0&imp=0&chf=0&ds=50583&fs=32319&sc=6Cache-Control: no-cacheMS-CV: WnmUCezSP0+2kxjF.0User-Agent: WindowsShellClient/9.0.40929.0 (Windows)X-SDK-HWF: tch0,m301,m751,mA01,mT01Host: arc.msn.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /fwlink/?linkid=851290&os=Windows&osVer=10.0.17134.1.amd64fre.rs4_release.180410-1804&sku=Professional&locale=en-US&ring=Retail&deviceId=%7BA2AB526A-D38D-4FC9-8BA0-E34B8D6354E8%7D&appVer=0.3.0.0&ubr=1&campaignId=%7B3f5c1adb-a179-4718-8e9f-0b616dd7abe7%7D HTTP/1.1Connection: Keep-AliveContent-Type: application/jsonUser-Agent: cpprestsdk/2.8.0Host: go.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=338388&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&ctry=US&time=20220721T075919Z&lc=en-US&pl=en-US&idtp=mid&uid=4388269c-b420-4134-ac19-bc7ca8a19ac1&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=18cf00c9262843088de87ae557318318&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1612239&metered=false&nettype=ethernet&npid=sc-338388&oemName=bugvnb%2C%20Inc.&oemid=bugvnb%2C%20Inc.&ossku=Professional&rver=2&smBiosDm=bugvnb7%2C1&tl=2&tsu=1612239&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing= HTTP/1.1Accept-Encoding: gzip, deflateX-SDK-CACHE: chs=0&imp=0&chf=0&ds=50583&fs=32319&sc=6X-SDK-HW-TOKEN: t=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&p=Cache-Control: no-cacheMS-CV: 1641d2xSJU2PcjWm.0User-Agent: WindowsShellClient/9.0.40929.0 (Windows)X-SDK-HWF: tch0,m301,m751,mA01,mT01Host: arc.msn.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=338387&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&ctry=US&time=20220721T075919Z&lc=en-US&pl=en-US&idtp=mid&uid=4388269c-b420-4134-ac19-bc7ca8a19ac1&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=0720a8a2d88f46febdcf50f630a25695&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1612239&metered=false&nettype=ethernet&npid=sc-338387&oemName=bugvnb%2C%20Inc.&oemid=bugvnb%2C%20Inc.&ossku=Professional&rver=2&sc-mode=0&smBiosDm=bugvnb7%2C1&tl=2&tsu=1612239&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing= HTTP/1.1Accept-Encoding: gzip, deflateX-SDK-CACHE: chs=0&imp=0&chf=0&ds=50583&fs=32319&sc=6X-SDK-HW-TOKEN: t=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&p=Cache-Control: no-cacheMS-CV: 1641d2xSJU2PcjWm.0User-Agent: WindowsShellClient/9.0.40929.0 (Windows)X-SDK-HWF: tch0,m301,m751,mA01,mT01Host: arc.msn.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4XJ83?ver=b124 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE50Fei?ver=2ac1 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4Pwej?ver=cbf0 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4PlTB?ver=2a94 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE50HTY?ver=bda9 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cms/api/am/imageFileData/RE4XLNP?ver=32e3 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134Host: img-prod-cms-rt-microsoft-com.akamaized.netConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=310091&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&ctry=US&time=20220721T075957Z&lc=en-US&pl=en-US&idtp=mid&uid=4388269c-b420-4134-ac19-bc7ca8a19ac1&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=0acf09d0040e403d9eec1cf86dfdfe3d&ctmode=MultiSession&arch=x64&cdm=1&cdmver=10.0.17134.1&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.17134.1&disphorzres=1280&dispsize=17.1&dispvertres=1024&isu=0&lo=1612239&metered=false&nettype=ethernet&npid=sc-310091&oemName=bugvnb%2C%20Inc.&oemid=bugvnb%2C%20Inc.&ossku=Professional&rver=2&smBiosDm=bugvnb7%2C1&tl=2&tsu=1612239&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing= HTTP/1.1Accept-Encoding: gzip, deflateX-SDK-CACHE: chs=0&imp=0&chf=0&ds=50583&fs=32319&sc=6X-SDK-HW-TOKEN: t=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&p=Cache-Control: no-cacheMS-CV: pnfw+6TkwES1Ih9a.0User-Agent: WindowsShellClient/9.0.40929.0 (Windows)X-SDK-HWF: tch0,m301,m751,mA01,mT01Host: arc.msn.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/installComplete?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFHWD2&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075928Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGGZM6WM&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075931Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFHWD2&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075932Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NH2GPH4JZS4&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075937Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGH6J6VK&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075937Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9P6RC76MSMMJ&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075938Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFJ27N&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075940Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9N0866FS04W8&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075941Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFJ10M&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075943Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFJ140&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075945Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NC2FBTHCJV8&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075945Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGH1CQ7L&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T075946Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&bSrc=i.t&time=20220721T075948Z&asid=cc042d283f8d4e829767e4b86e7542d4&eid= HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/installComplete?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFJ3P2&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080000Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/installComplete?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGH5FV99&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080002Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NXQXXLFST89&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080004Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFHVFW&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080004Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NCBCSZSJRSB&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080005Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NMPJ99VJBWV&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080006Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGH5FV99&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080007Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/opportunity?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRDFNG7&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080008Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&bSrc=i.t&time=20220721T080009Z&asid=3b0b1053fb2f4cce85c5fbba5d840afa&eid= HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?CID=128000000000402926&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&EID=&&PID=400089837&UIT=P-&TargetID=700129702&AN=77891920&PG=PC000P0FR5.0000000IRT&REQASID=18CF00C9262843088DE87AE557318318&UNID=338388&ASID=fd549e6c5e46404c8115ae9ccca5f98e&PERSID=DBDE13DC697F71846A990CDFDC016FBD&GLOBALDEVICEID=6755432004667435&LOCALID=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&DS_EVTID=e0aae414db1d4e4f9b0fb212d58ef031&DEVOSVER=10.0.17134.1&REQT=20220720T225923&TIME=20220721T075958Z&ARCRAS=&CLR=CDM HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?CID=128000000000402926&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&EID=&&PID=400089837&UIT=P-&TargetID=700129702&AN=77891920&PG=PC000P0FR5.0000000IRT&REQASID=18CF00C9262843088DE87AE557318318&UNID=338388&ASID=fd549e6c5e46404c8115ae9ccca5f98e&PERSID=DBDE13DC697F71846A990CDFDC016FBD&GLOBALDEVICEID=6755432004667435&LOCALID=w:472DC600-FEAB-E7F8-720D-1E33F00FD1E7&DS_EVTID=e0aae414db1d4e4f9b0fb212d58ef031&DEVOSVER=10.0.17134.1&REQT=20220720T225923&TIME=20220721T080000Z&ARCRAS=&CLR=CDM HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /SLS/%7B9482F4B4-E343-43B6-B170-9A65BC822C77%7D/x64/10.0.17134.1/0?CH=17&L=en-US&P=&PT=0x30&WUA=10.0.17134.1&MK=edRP+6a3Cgml6fa&MD=ulZ+v86Y HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.81Host: sls.update.microsoft.com
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NMPJ99VJBWV&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080035Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NMPJ99VJBWV&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080039Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NXQXXLFST89&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080039Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NXQXXLFST89&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080040Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFHVFW&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080041Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFHVFW&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080043Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGH5FV99&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080049Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGH5FV99&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080050Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRDFNG7&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080051Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRDFNG7&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080052Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NCBCSZSJRSB&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080053Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106554&cid=128000000001392709&tid=700342084&reqasid=2e945e2fbfb8413c875f2e72a3056cf5&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NCBCSZSJRSB&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=3b0b1053fb2f4cce85c5fbba5d840afa&time=20220721T080054Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGGZM6WM&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080056Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFJ27N&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080057Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFJ27N&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080058Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9P6RC76MSMMJ&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080059Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9P6RC76MSMMJ&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080101Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NBLGGH6J6VK&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080103Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NH2GPH4JZS4&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080109Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9NH2GPH4JZS4&skuId=0010&installKind=Install&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080110Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/pin?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFHWD2&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080111Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /v1/a/impression?pg=PC000P0FR5.0000000IQ8&unid=&placementType=PostOOBE&app=&pid=425106558&cid=128000000001392729&tid=700342085&reqasid=761c4adb412145f0bf228b537f285c2f&region=US&lang=EN-US&oem=&devFam=WINDOWS.DESKTOP&ossku=PROFESSIONAL&cmdVer=10.0.17134.1&mo=&cap=&auid=&anid=&muid=&persid=&itemId=9WZDNCRFHWD2&skuId=0010&installKind=RedirectTile&ctid=store-curated-postoobe&bSrc=i.t&asid=cc042d283f8d4e829767e4b86e7542d4&time=20220721T080113Z HTTP/1.1Accept-Encoding: gzip, deflateUser-Agent: WindowsShellClient/9.0.40929.0 (Windows)Host: ris.api.iris.microsoft.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /settings/v2.0/WSD/WaaSAssessment?os=Windows&osVer=10.0.17134.1.amd64fre.rs4_release.180410-&ring=Retail&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=A2AB526A-D38D-4FC9-8BA0-E34B8D6354E8&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWindows%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_467f181075371c89%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=10.0&ProcessorIdentifier=Intel64%20Family%206%20Model%2085%20Stepping%207&ChinaTypeApproval_CTA=&OEMModel=VMware7%2C1&UpdateOfferedDays=1233&ProcessorManufacturer=GenuineIntel&InstallDate=1600369592&OEMModelBaseBoard=440BX%20Desktop%20Reference%20Platform&BranchReadinessLevel=CB&OEMSubModel=&IsCloudDomainJoined=0&Bios=2019&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&PonchAllow=0&DeviceFamily=Windows.Desktop&WuClientVer=10.0.17134.1&IsFlightingEnabled=0&OSSkuId=48&App=WaaSAssessment&CurrentBranch=rs4_release&InstallLanguage=en-US&ServicingBranch=CB&OEMName_Uncleaned=VMware%2C%20Inc.&TPMVersion=0&InstallationType=Client&AttrDataVer=149&ProcessorModel=Intel%28R%29%20Core%28TM%292%20CPU%206600%20%40%202.40%20GHz&GStatusBlockIDs_All=&OSVersion=10.0.17134.1&IsMDMEnrolled=0&ActivationChannel=OEM%3ANONSLP&HonorWUfBDeferrals=0&Free=16to32&FirmwareVersion=VMW71.00V.18227214.B64.2106252220&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2 HTTP/1.1Connection: Keep-AliveAuthorization: MsaToken t=GwAWAX94BAAU+vB6B7/6tNI0vbzcuOrZ3eBJR2gOZgAAEJcxee3AALFS8cjfXBs0l4/gAOoe0D/ptTEua7+n/cFMjNZXZ4t2tClrjf1THwM4uLemfm40aXhMk1HE2+OL4ubXEGGkesfWeg6LJ1lJBm+F95VKyL/tJgV53bLKnpKfRAex5Np4nq73bWKVzL6jiColqcnOQSc8qTy92Z3cyxQn8Lz1OheFs1c6sOZB1RM9CDt4dUj4TV4N2D1m4MLmnNYfd/eQCTad0YnI3xhA6gWkqqOTi2DSrOgDYYQQ50SCUiwuUbf0cijF5vYMCdP63OidCJpHnefwVnTSGt3a8NcAM9jJZItCMVrcNkBSGCtyilbAGwE=&p=If-None-Match: 360:66A2A3862F7048D2E5118FFF547B163A::2F143E28E2User-Agent: WaaSAssessmentHost: settings-win.data.microsoft.com
            Source: unknownHTTPS traffic detected: 20.190.159.70:443 -> 192.168.2.3:50214 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 204.79.197.200:443 -> 192.168.2.3:50240 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 204.79.197.200:443 -> 192.168.2.3:50239 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.106.135:443 -> 192.168.2.3:50242 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.106.135:443 -> 192.168.2.3:50241 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.205.181.161:443 -> 192.168.2.3:50816 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.108.18:443 -> 192.168.2.3:51030 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.31.108.18:443 -> 192.168.2.3:51029 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51602 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51604 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51606 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51603 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 80.67.82.211:443 -> 192.168.2.3:51605 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:53568 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:53692 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:53758 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.238.103.94:443 -> 192.168.2.3:53823 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:53822 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.242.101.226:443 -> 192.168.2.3:53901 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.242.101.226:443 -> 192.168.2.3:53967 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54041 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.242.101.226:443 -> 192.168.2.3:54109 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54198 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54258 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54342 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54397 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54521 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54568 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54675 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.152.110.14:443 -> 192.168.2.3:54833 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.125.122.176:443 -> 192.168.2.3:54899 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 20.190.159.22:443 -> 192.168.2.3:49562 version: TLS 1.2
            Source: loaddll32.exe, 00000000.00000002.290655164.00000000009EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: Yara matchFile source: Z6oBXEnHSp.dll, type: SAMPLE
            Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.889387707.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000000.286498095.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.289744917.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000000.284107622.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.292122569.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.295320636.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.295226841.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.290849323.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.293061959.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000000.285865657.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.299483346.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000000.285112854.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 6444, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\mssecsvr.exe, type: DROPPED

            System Summary

            barindex
            Source: Z6oBXEnHSp.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: Z6oBXEnHSp.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 4.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: 00000008.00000000.293236571.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000004.00000000.285972677.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000004.00000002.295459493.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000004.00000000.284172203.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000000.295327571.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000000.290908132.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000004.00000000.286557515.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000007.00000000.289939401.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000002.299587740.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000008.00000000.292183748.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: 00000004.00000000.285315285.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
            Source: Z6oBXEnHSp.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: Z6oBXEnHSp.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: Z6oBXEnHSp.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.5.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.3.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.3.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.7.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.2.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.5.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 4.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.mssecsvr.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.7100a4.7.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 8.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 7.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 4.0.mssecsvr.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: 00000008.00000000.293236571.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000004.00000000.285972677.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000004.00000002.295459493.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000004.00000000.284172203.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000000.295327571.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000000.290908132.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000004.00000000.286557515.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000007.00000000.289939401.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000002.299587740.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000008.00000000.292183748.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: 00000004.00000000.285315285.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\tasksche.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
            Source: C:\Windows\mssecsvr.exe, type: DROPPEDMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
            Source: mssecsvr.exe.2.drStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
            Source: tasksche.exe.4.drStatic PE information: No import functions for PE file found
            Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
            Source: tasksche.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: tasksche.exe.4.drStatic PE information: Section: .rdata ZLIB complexity 1.0007621951219512
            Source: tasksche.exe.4.drStatic PE information: Section: .data ZLIB complexity 1.001953125
            Source: tasksche.exe.4.drStatic PE information: Section: .rsrc ZLIB complexity 1.0007408405172413
            Source: Z6oBXEnHSp.dllVirustotal: Detection: 88%
            Source: Z6oBXEnHSp.dllMetadefender: Detection: 78%
            Source: Z6oBXEnHSp.dllReversingLabs: Detection: 90%
            Source: Z6oBXEnHSp.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Z6oBXEnHSp.dll,PlayGame
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",PlayGame
            Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
            Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
            Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Z6oBXEnHSp.dll,PlayGameJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",PlayGameJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
            Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: classification engineClassification label: mal100.rans.troj.expl.evad.winDLL@32/9@4/100
            Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,4_2_00407C40
            Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,7_2_00407C40
            Source: C:\Windows\mssecsvr.exeCode function: 4_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,4_2_00408090
            Source: C:\Windows\mssecsvr.exeCode function: 7_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,7_2_00408090
            Source: C:\Windows\mssecsvr.exeCode function: 4_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,4_2_00407C40
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Z6oBXEnHSp.dll,PlayGame
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:10072:120:WilError_01
            Source: C:\Windows\mssecsvr.exeCode function: 4_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,FindCloseChangeNotification,CreateProcessA,CloseHandle,CloseHandle,4_2_00407CE0
            Source: Z6oBXEnHSp.dll, mssecsvr.exe.2.dr, tasksche.exe.4.drBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
            Source: C:\Windows\mssecsvr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\mssecsvr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\mssecsvr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\mssecsvr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\mssecsvr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\mssecsvr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Z6oBXEnHSp.dllStatic file information: File size 5267459 > 1048576
            Source: Z6oBXEnHSp.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
            Source: initial sampleStatic PE information: section name: .text entropy: 7.629817620008621

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
            Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
            Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\mssecsvr.exeJump to dropped file
            Source: C:\Windows\mssecsvr.exeCode function: 4_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,4_2_00407C40
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Windows\mssecsvr.exe TID: 6568Thread sleep time: -32000s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvr.exe TID: 6576Thread sleep count: 953 > 30Jump to behavior
            Source: C:\Windows\mssecsvr.exe TID: 6576Thread sleep time: -95300s >= -30000sJump to behavior
            Source: C:\Windows\mssecsvr.exe TID: 6576Thread sleep count: 49 > 30Jump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 6932Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 7260Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 7424Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 5732Thread sleep time: -90000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
            Source: C:\Windows\mssecsvr.exeDropped PE file which has not been started: C:\Windows\tasksche.exeJump to dropped file
            Source: C:\Windows\mssecsvr.exeWindow / User API: threadDelayed 953Jump to behavior
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: svchost.exe, 00000011.00000002.673958735.0000021630664000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
            Source: svchost.exe, 00000016.00000002.889308524.000002261A800000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -win.data.microsoft.com/settings/v2.0/WSD/WaaSAssessment?os=Windows&osVer=10.0.17134.1.amd64fre.rs4_release.180410-&ring=Retail&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=A2AB526A-D38D-4FC9-8BA0-E34B8D6354E8&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWindows%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_467f181075371c89%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=10.0&ProcessorIdentifier=Intel64%20Family%206%20Model%2085%20Stepping%207&ChinaTypeApproval_CTA=&OEMModel=VMware7%2C1&UpdateOfferedDays=1233&ProcessorManufacturer=GenuineIntel&InstallDate=1600369592&OEMModelBaseBoard=440BX%20Desktop%20Reference%20Platform&BranchReadinessLevel=CB&OEMSubModel=&IsCloudDomainJoined=0&Bios=2019&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&PonchAllow=0&DeviceFamily=Windows.Desktop&WuClientVer=10.0.17134.1&IsFlightingEnabled=0&OSSkuId=48&App=WaaSAssessment&CurrentBranch=rs4_release&InstallLanguage=en-US&ServicingBranch=CB&OEMName_Uncleaned=VMware%2C%20Inc.&TPMVersion=0&InstallationType=Client&AttrDataVer=149&ProcessorModel=Intel%28R%29%20Core%28TM%292%20CPU%206600%20%40%202.40%20GHz&GStatusBlockIDs_All=&OSVersion=10.0.17134.1&IsMDMEnrolled=0&ActivationChannel=OEM%3ANONSLP&HonorWUfBDeferrals=0&Free=16to32&FirmwareVersion=VMW71.00V.18227214.B64.2106252220&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
            Source: svchost.exe, 00000009.00000002.889169253.00000210FBE02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
            Source: svchost.exe, 00000011.00000002.673922520.000002163064D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.631099516.00000133106A7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.631246332.00000133106EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: svchost.exe, 00000021.00000002.631230271.00000133106E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW+
            Source: svchost.exe, 00000011.00000002.673474824.000002162AE2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: mssecsvr.exe, 00000008.00000002.300222658.0000000000C67000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Z6oBXEnHSp.dll",#1Jump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Windows Management Instrumentation
            4
            Windows Service
            4
            Windows Service
            12
            Masquerading
            1
            Input Capture
            1
            Network Share Discovery
            Remote Services1
            Input Capture
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts2
            Service Execution
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Disable or Modify Tools
            LSASS Memory221
            Security Software Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            DLL Side-Loading
            121
            Virtualization/Sandbox Evasion
            Security Account Manager121
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer14
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Rundll32
            Cached Domain Credentials21
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items4
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 670540 Sample: Z6oBXEnHSp Startdate: 21/07/2022 Architecture: WINDOWS Score: 100 57 Multi AV Scanner detection for domain / URL 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 Antivirus detection for URL or domain 2->61 63 7 other signatures 2->63 8 loaddll32.exe 1 2->8         started        10 mssecsvr.exe 2->10         started        14 svchost.exe 2->14         started        16 11 other processes 2->16 process3 dnsIp4 18 cmd.exe 1 8->18         started        20 rundll32.exe 8->20         started        23 rundll32.exe 1 8->23         started        49 192.168.2.120 unknown unknown 10->49 51 192.168.2.121 unknown unknown 10->51 53 99 other IPs or domains 10->53 73 Connects to many different private IPs via SMB (likely to spread or exploit) 10->73 75 Connects to many different private IPs (likely to spread or exploit) 10->75 77 Changes security center settings (notifications, updates, antivirus, firewall) 14->77 26 MpCmdRun.exe 1 14->26         started        79 Query firmware table information (likely to detect VMs) 16->79 signatures5 process6 file7 28 rundll32.exe 18->28         started        65 Drops executables to the windows directory (C:\Windows) and starts them 20->65 30 mssecsvr.exe 7 20->30         started        43 C:\Windows\mssecsvr.exe, PE32 23->43 dropped 34 conhost.exe 26->34         started        signatures8 process9 dnsIp10 36 mssecsvr.exe 7 28->36         started        55 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 30->55 45 C:\WINDOWS\qeriuwjhrf (copy), PE32 30->45 dropped file11 process12 dnsIp13 47 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 36->47 41 C:\Windows\tasksche.exe, PE32 36->41 dropped 67 Antivirus detection for dropped file 36->67 69 Multi AV Scanner detection for dropped file 36->69 71 Machine Learning detection for dropped file 36->71 file14 signatures15

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.