Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VIkn1bnYkP.exe

Overview

General Information

Sample name:VIkn1bnYkP.exe
renamed because original name is a hash value
Original sample name:620b3ea51589f00ffacd205d3339389036819c84f2b8dc96873d0cbf9d625365.exe
Analysis ID:1617791
MD5:7cf55ba67a1c0a856f3c50bbb1f44cb0
SHA1:e9db89d19bb80ca7b926f28af179d2d70fc69c2d
SHA256:620b3ea51589f00ffacd205d3339389036819c84f2b8dc96873d0cbf9d625365
Tags:92-255-85-36exeuser-JAMESWT_MHT
Infos:

Detection

RedLine, SectopRAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
Yara detected SectopRAT
Connects to many ports of the same IP (likely port scanning)
Joe Sandbox ML detected suspicious sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VIkn1bnYkP.exe (PID: 5932 cmdline: "C:\Users\user\Desktop\VIkn1bnYkP.exe" MD5: 7CF55BA67A1C0A856F3C50BBB1F44CB0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
No configs have been found
SourceRuleDescriptionAuthorStrings
VIkn1bnYkP.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    VIkn1bnYkP.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      VIkn1bnYkP.exeMALWARE_Win_Arechclient2Detects Arechclient2 RATditekSHen
      • 0xb5026:$s14: keybd_event
      • 0xbbf88:$v1_1: grabber@
      • 0xb5be2:$v1_2: <BrowserProfile>k__
      • 0xb666f:$v1_3: <SystemHardwares>k__
      • 0xb672e:$v1_5: <ScannedWallets>k__
      • 0xb67be:$v1_6: <DicrFiles>k__
      • 0xb679a:$v1_7: <MessageClientFiles>k__
      • 0xb6b64:$v1_8: <ScanBrowsers>k__BackingField
      • 0xb6bb6:$v1_8: <ScanWallets>k__BackingField
      • 0xb6bd3:$v1_8: <ScanScreen>k__BackingField
      • 0xb6c0d:$v1_8: <ScanVPN>k__BackingField
      • 0xa8542:$v1_9: displayName[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}Local Extension Settingshost
      • 0xa7e4e:$v1_10: \sitemanager.xml MB or SELECT * FROM Cookiesconfig
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1689534765.0000000000592000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000000.1689534765.0000000000592000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          Process Memory Space: VIkn1bnYkP.exe PID: 5932JoeSecurity_SectopRATYara detected SectopRATJoe Security
            Process Memory Space: VIkn1bnYkP.exe PID: 5932JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: VIkn1bnYkP.exe PID: 5932JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                SourceRuleDescriptionAuthorStrings
                0.0.VIkn1bnYkP.exe.590000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.0.VIkn1bnYkP.exe.590000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    0.0.VIkn1bnYkP.exe.590000.0.unpackMALWARE_Win_Arechclient2Detects Arechclient2 RATditekSHen
                    • 0xb5026:$s14: keybd_event
                    • 0xbbf88:$v1_1: grabber@
                    • 0xb5be2:$v1_2: <BrowserProfile>k__
                    • 0xb666f:$v1_3: <SystemHardwares>k__
                    • 0xb672e:$v1_5: <ScannedWallets>k__
                    • 0xb67be:$v1_6: <DicrFiles>k__
                    • 0xb679a:$v1_7: <MessageClientFiles>k__
                    • 0xb6b64:$v1_8: <ScanBrowsers>k__BackingField
                    • 0xb6bb6:$v1_8: <ScanWallets>k__BackingField
                    • 0xb6bd3:$v1_8: <ScanScreen>k__BackingField
                    • 0xb6c0d:$v1_8: <ScanVPN>k__BackingField
                    • 0xa8542:$v1_9: displayName[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}Local Extension Settingshost
                    • 0xa7e4e:$v1_10: \sitemanager.xml MB or SELECT * FROM Cookiesconfig
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-02-18T08:48:43.199260+010020522481A Network Trojan was detected192.168.2.44973292.255.85.369000TCP
                    2025-02-18T08:48:44.018987+010020522481A Network Trojan was detected192.168.2.44973392.255.85.369000TCP
                    2025-02-18T08:48:44.826910+010020522481A Network Trojan was detected192.168.2.44973492.255.85.369000TCP
                    2025-02-18T08:48:45.671555+010020522481A Network Trojan was detected192.168.2.44973592.255.85.369000TCP
                    2025-02-18T08:48:46.492375+010020522481A Network Trojan was detected192.168.2.44973692.255.85.369000TCP
                    2025-02-18T08:48:47.310649+010020522481A Network Trojan was detected192.168.2.44973792.255.85.369000TCP
                    2025-02-18T08:48:48.125552+010020522481A Network Trojan was detected192.168.2.44973892.255.85.369000TCP
                    2025-02-18T08:48:48.968260+010020522481A Network Trojan was detected192.168.2.44973992.255.85.369000TCP
                    2025-02-18T08:48:49.771093+010020522481A Network Trojan was detected192.168.2.44974092.255.85.369000TCP
                    2025-02-18T08:48:50.565530+010020522481A Network Trojan was detected192.168.2.44974192.255.85.369000TCP
                    2025-02-18T08:48:51.365374+010020522481A Network Trojan was detected192.168.2.44974292.255.85.369000TCP
                    2025-02-18T08:48:52.158397+010020522481A Network Trojan was detected192.168.2.44974392.255.85.369000TCP
                    2025-02-18T08:48:52.957607+010020522481A Network Trojan was detected192.168.2.44974492.255.85.369000TCP
                    2025-02-18T08:48:53.755386+010020522481A Network Trojan was detected192.168.2.44974592.255.85.369000TCP
                    2025-02-18T08:48:54.592369+010020522481A Network Trojan was detected192.168.2.44974692.255.85.369000TCP
                    2025-02-18T08:48:55.398497+010020522481A Network Trojan was detected192.168.2.44974792.255.85.369000TCP
                    2025-02-18T08:48:56.197222+010020522481A Network Trojan was detected192.168.2.44974892.255.85.369000TCP
                    2025-02-18T08:48:56.998495+010020522481A Network Trojan was detected192.168.2.44975092.255.85.369000TCP
                    2025-02-18T08:48:57.878503+010020522481A Network Trojan was detected192.168.2.44975192.255.85.369000TCP
                    2025-02-18T08:48:58.676640+010020522481A Network Trojan was detected192.168.2.44975492.255.85.369000TCP
                    2025-02-18T08:48:59.495014+010020522481A Network Trojan was detected192.168.2.44975792.255.85.369000TCP
                    2025-02-18T08:49:00.309147+010020522481A Network Trojan was detected192.168.2.44975892.255.85.369000TCP
                    2025-02-18T08:49:01.131393+010020522481A Network Trojan was detected192.168.2.44976092.255.85.369000TCP
                    2025-02-18T08:49:01.927411+010020522481A Network Trojan was detected192.168.2.44976192.255.85.369000TCP
                    2025-02-18T08:49:02.741531+010020522481A Network Trojan was detected192.168.2.44976292.255.85.369000TCP
                    2025-02-18T08:49:03.566922+010020522481A Network Trojan was detected192.168.2.44976392.255.85.369000TCP
                    2025-02-18T08:49:04.362743+010020522481A Network Trojan was detected192.168.2.44976492.255.85.369000TCP
                    2025-02-18T08:49:05.172587+010020522481A Network Trojan was detected192.168.2.44976592.255.85.369000TCP
                    2025-02-18T08:49:05.975549+010020522481A Network Trojan was detected192.168.2.44976692.255.85.369000TCP
                    2025-02-18T08:49:06.789332+010020522481A Network Trojan was detected192.168.2.44976792.255.85.369000TCP
                    2025-02-18T08:49:07.593223+010020522481A Network Trojan was detected192.168.2.44976892.255.85.369000TCP
                    2025-02-18T08:49:08.414067+010020522481A Network Trojan was detected192.168.2.44976992.255.85.369000TCP
                    2025-02-18T08:49:09.208980+010020522481A Network Trojan was detected192.168.2.44977092.255.85.369000TCP
                    2025-02-18T08:49:10.032472+010020522481A Network Trojan was detected192.168.2.44977192.255.85.369000TCP
                    2025-02-18T08:49:10.843126+010020522481A Network Trojan was detected192.168.2.44977292.255.85.369000TCP
                    2025-02-18T08:49:11.658654+010020522481A Network Trojan was detected192.168.2.44977392.255.85.369000TCP
                    2025-02-18T08:49:12.457380+010020522481A Network Trojan was detected192.168.2.44977492.255.85.369000TCP
                    2025-02-18T08:49:13.283880+010020522481A Network Trojan was detected192.168.2.44977592.255.85.369000TCP
                    2025-02-18T08:49:14.109937+010020522481A Network Trojan was detected192.168.2.44977692.255.85.369000TCP
                    2025-02-18T08:49:14.918389+010020522481A Network Trojan was detected192.168.2.44977792.255.85.369000TCP
                    2025-02-18T08:49:15.717381+010020522481A Network Trojan was detected192.168.2.44977892.255.85.369000TCP
                    2025-02-18T08:49:16.521991+010020522481A Network Trojan was detected192.168.2.44977992.255.85.369000TCP
                    2025-02-18T08:49:17.322883+010020522481A Network Trojan was detected192.168.2.44978092.255.85.369000TCP
                    2025-02-18T08:49:18.128997+010020522481A Network Trojan was detected192.168.2.44978192.255.85.369000TCP
                    2025-02-18T08:49:18.926992+010020522481A Network Trojan was detected192.168.2.44978292.255.85.369000TCP
                    2025-02-18T08:49:19.730902+010020522481A Network Trojan was detected192.168.2.44978392.255.85.369000TCP
                    2025-02-18T08:49:20.543062+010020522481A Network Trojan was detected192.168.2.44978492.255.85.369000TCP
                    2025-02-18T08:49:21.539017+010020522481A Network Trojan was detected192.168.2.44978592.255.85.369000TCP
                    2025-02-18T08:49:22.334776+010020522481A Network Trojan was detected192.168.2.44978692.255.85.369000TCP
                    2025-02-18T08:49:23.138213+010020522481A Network Trojan was detected192.168.2.44978792.255.85.369000TCP
                    2025-02-18T08:49:23.964119+010020522481A Network Trojan was detected192.168.2.44978892.255.85.369000TCP
                    2025-02-18T08:49:24.753056+010020522481A Network Trojan was detected192.168.2.44978992.255.85.369000TCP
                    2025-02-18T08:49:25.552114+010020522481A Network Trojan was detected192.168.2.44979092.255.85.369000TCP
                    2025-02-18T08:49:26.367324+010020522481A Network Trojan was detected192.168.2.44979192.255.85.369000TCP
                    2025-02-18T08:49:27.160028+010020522481A Network Trojan was detected192.168.2.44979292.255.85.369000TCP
                    2025-02-18T08:49:27.967485+010020522481A Network Trojan was detected192.168.2.44979392.255.85.369000TCP
                    2025-02-18T08:49:28.779183+010020522481A Network Trojan was detected192.168.2.44979492.255.85.369000TCP
                    2025-02-18T08:49:29.583197+010020522481A Network Trojan was detected192.168.2.44979592.255.85.369000TCP
                    2025-02-18T08:49:30.387305+010020522481A Network Trojan was detected192.168.2.44979692.255.85.369000TCP
                    2025-02-18T08:49:31.197239+010020522481A Network Trojan was detected192.168.2.44979792.255.85.369000TCP
                    2025-02-18T08:49:31.990147+010020522481A Network Trojan was detected192.168.2.44979892.255.85.369000TCP
                    2025-02-18T08:49:32.787665+010020522481A Network Trojan was detected192.168.2.44979992.255.85.369000TCP
                    2025-02-18T08:49:33.593001+010020522481A Network Trojan was detected192.168.2.44980092.255.85.369000TCP
                    2025-02-18T08:49:34.404982+010020522481A Network Trojan was detected192.168.2.44980192.255.85.369000TCP
                    2025-02-18T08:49:35.243330+010020522481A Network Trojan was detected192.168.2.44980292.255.85.369000TCP
                    2025-02-18T08:49:36.064353+010020522481A Network Trojan was detected192.168.2.44980592.255.85.369000TCP
                    2025-02-18T08:49:36.867274+010020522481A Network Trojan was detected192.168.2.44980692.255.85.369000TCP
                    2025-02-18T08:49:37.682634+010020522481A Network Trojan was detected192.168.2.44981292.255.85.369000TCP
                    2025-02-18T08:49:38.552088+010020522481A Network Trojan was detected192.168.2.44981892.255.85.369000TCP
                    2025-02-18T08:49:39.367037+010020522481A Network Trojan was detected192.168.2.44982492.255.85.369000TCP
                    2025-02-18T08:49:40.162130+010020522481A Network Trojan was detected192.168.2.44983092.255.85.369000TCP
                    2025-02-18T08:49:40.991047+010020522481A Network Trojan was detected192.168.2.44983692.255.85.369000TCP
                    2025-02-18T08:49:41.812466+010020522481A Network Trojan was detected192.168.2.44984092.255.85.369000TCP
                    2025-02-18T08:49:42.617640+010020522481A Network Trojan was detected192.168.2.44984892.255.85.369000TCP
                    2025-02-18T08:49:43.441820+010020522481A Network Trojan was detected192.168.2.44985492.255.85.369000TCP
                    2025-02-18T08:49:44.247380+010020522481A Network Trojan was detected192.168.2.44986092.255.85.369000TCP
                    2025-02-18T08:49:45.051700+010020522481A Network Trojan was detected192.168.2.44986692.255.85.369000TCP
                    2025-02-18T08:49:45.868824+010020522481A Network Trojan was detected192.168.2.44987292.255.85.369000TCP
                    2025-02-18T08:49:46.671235+010020522481A Network Trojan was detected192.168.2.44987892.255.85.369000TCP
                    2025-02-18T08:49:47.495673+010020522481A Network Trojan was detected192.168.2.44988492.255.85.369000TCP
                    2025-02-18T08:49:48.299339+010020522481A Network Trojan was detected192.168.2.44989092.255.85.369000TCP
                    2025-02-18T08:49:49.110193+010020522481A Network Trojan was detected192.168.2.44989692.255.85.369000TCP
                    2025-02-18T08:49:49.916384+010020522481A Network Trojan was detected192.168.2.44990292.255.85.369000TCP
                    2025-02-18T08:49:50.709224+010020522481A Network Trojan was detected192.168.2.44990892.255.85.369000TCP
                    2025-02-18T08:49:51.527067+010020522481A Network Trojan was detected192.168.2.44991492.255.85.369000TCP
                    2025-02-18T08:49:52.327719+010020522481A Network Trojan was detected192.168.2.44992092.255.85.369000TCP
                    2025-02-18T08:49:53.162016+010020522481A Network Trojan was detected192.168.2.44992792.255.85.369000TCP
                    2025-02-18T08:49:53.960511+010020522481A Network Trojan was detected192.168.2.44993392.255.85.369000TCP
                    2025-02-18T08:49:54.784221+010020522481A Network Trojan was detected192.168.2.44993992.255.85.369000TCP
                    2025-02-18T08:49:55.582182+010020522481A Network Trojan was detected192.168.2.44994592.255.85.369000TCP
                    2025-02-18T08:49:56.409884+010020522481A Network Trojan was detected192.168.2.44995192.255.85.369000TCP
                    2025-02-18T08:49:57.210943+010020522481A Network Trojan was detected192.168.2.44995792.255.85.369000TCP
                    2025-02-18T08:49:58.024256+010020522481A Network Trojan was detected192.168.2.44996392.255.85.369000TCP
                    2025-02-18T08:49:58.819358+010020522481A Network Trojan was detected192.168.2.44996992.255.85.369000TCP
                    2025-02-18T08:49:59.648662+010020522481A Network Trojan was detected192.168.2.44997592.255.85.369000TCP
                    2025-02-18T08:50:00.470948+010020522481A Network Trojan was detected192.168.2.44998292.255.85.369000TCP
                    2025-02-18T08:50:01.269988+010020522481A Network Trojan was detected192.168.2.44998892.255.85.369000TCP
                    2025-02-18T08:50:02.091375+010020522481A Network Trojan was detected192.168.2.44999492.255.85.369000TCP
                    2025-02-18T08:50:02.971438+010020522481A Network Trojan was detected192.168.2.45000092.255.85.369000TCP
                    2025-02-18T08:50:03.778766+010020522481A Network Trojan was detected192.168.2.45000792.255.85.369000TCP
                    2025-02-18T08:50:04.601048+010020522481A Network Trojan was detected192.168.2.45001692.255.85.369000TCP
                    2025-02-18T08:50:05.454485+010020522481A Network Trojan was detected192.168.2.45002292.255.85.369000TCP
                    2025-02-18T08:50:06.267424+010020522481A Network Trojan was detected192.168.2.45002892.255.85.369000TCP
                    2025-02-18T08:50:07.092777+010020522481A Network Trojan was detected192.168.2.45003492.255.85.369000TCP
                    2025-02-18T08:50:07.902635+010020522481A Network Trojan was detected192.168.2.45004092.255.85.369000TCP
                    2025-02-18T08:50:08.725530+010020522481A Network Trojan was detected192.168.2.45004492.255.85.369000TCP
                    2025-02-18T08:50:09.532888+010020522481A Network Trojan was detected192.168.2.45005092.255.85.369000TCP
                    2025-02-18T08:50:10.340834+010020522481A Network Trojan was detected192.168.2.45005692.255.85.369000TCP
                    2025-02-18T08:50:11.153984+010020522481A Network Trojan was detected192.168.2.45006292.255.85.369000TCP
                    2025-02-18T08:50:11.983230+010020522481A Network Trojan was detected192.168.2.45006892.255.85.369000TCP
                    2025-02-18T08:50:12.785214+010020522481A Network Trojan was detected192.168.2.45007492.255.85.369000TCP
                    2025-02-18T08:50:13.586408+010020522481A Network Trojan was detected192.168.2.45007892.255.85.369000TCP
                    2025-02-18T08:50:14.433818+010020522481A Network Trojan was detected192.168.2.45008392.255.85.369000TCP
                    2025-02-18T08:50:15.247186+010020522481A Network Trojan was detected192.168.2.45008992.255.85.369000TCP
                    2025-02-18T08:50:16.060855+010020522481A Network Trojan was detected192.168.2.45009592.255.85.369000TCP
                    2025-02-18T08:50:16.883343+010020522481A Network Trojan was detected192.168.2.45010192.255.85.369000TCP
                    2025-02-18T08:50:17.709517+010020522481A Network Trojan was detected192.168.2.45010792.255.85.369000TCP
                    2025-02-18T08:50:18.534536+010020522481A Network Trojan was detected192.168.2.45011392.255.85.369000TCP
                    2025-02-18T08:50:19.340213+010020522481A Network Trojan was detected192.168.2.45011992.255.85.369000TCP
                    2025-02-18T08:50:20.137218+010020522481A Network Trojan was detected192.168.2.45012492.255.85.369000TCP
                    2025-02-18T08:50:20.948900+010020522481A Network Trojan was detected192.168.2.45012592.255.85.369000TCP
                    2025-02-18T08:50:21.769196+010020522481A Network Trojan was detected192.168.2.45012692.255.85.369000TCP
                    2025-02-18T08:50:22.568401+010020522481A Network Trojan was detected192.168.2.45012792.255.85.369000TCP
                    2025-02-18T08:50:23.363408+010020522481A Network Trojan was detected192.168.2.45012892.255.85.369000TCP
                    2025-02-18T08:50:24.162506+010020522481A Network Trojan was detected192.168.2.45012992.255.85.369000TCP
                    2025-02-18T08:50:24.985080+010020522481A Network Trojan was detected192.168.2.45013092.255.85.369000TCP
                    2025-02-18T08:50:25.786417+010020522481A Network Trojan was detected192.168.2.45013192.255.85.369000TCP
                    2025-02-18T08:50:26.584679+010020522481A Network Trojan was detected192.168.2.45013292.255.85.369000TCP
                    2025-02-18T08:50:27.385152+010020522481A Network Trojan was detected192.168.2.45013392.255.85.369000TCP
                    2025-02-18T08:50:28.210269+010020522481A Network Trojan was detected192.168.2.45013492.255.85.369000TCP
                    2025-02-18T08:50:29.026099+010020522481A Network Trojan was detected192.168.2.45013592.255.85.369000TCP
                    2025-02-18T08:50:29.818919+010020522481A Network Trojan was detected192.168.2.45013692.255.85.369000TCP
                    2025-02-18T08:50:30.639131+010020522481A Network Trojan was detected192.168.2.45013792.255.85.369000TCP
                    2025-02-18T08:50:31.442526+010020522481A Network Trojan was detected192.168.2.45013892.255.85.369000TCP
                    2025-02-18T08:50:32.241236+010020522481A Network Trojan was detected192.168.2.45013992.255.85.369000TCP
                    2025-02-18T08:50:33.062237+010020522481A Network Trojan was detected192.168.2.45014092.255.85.369000TCP
                    2025-02-18T08:50:33.869140+010020522481A Network Trojan was detected192.168.2.45014192.255.85.369000TCP
                    2025-02-18T08:50:34.662797+010020522481A Network Trojan was detected192.168.2.45014292.255.85.369000TCP
                    2025-02-18T08:50:35.466625+010020522481A Network Trojan was detected192.168.2.45014392.255.85.369000TCP
                    2025-02-18T08:50:36.293241+010020522481A Network Trojan was detected192.168.2.45014492.255.85.369000TCP
                    2025-02-18T08:50:37.114227+010020522481A Network Trojan was detected192.168.2.45014592.255.85.369000TCP
                    2025-02-18T08:50:37.923855+010020522481A Network Trojan was detected192.168.2.45014692.255.85.369000TCP
                    2025-02-18T08:50:38.724906+010020522481A Network Trojan was detected192.168.2.45014792.255.85.369000TCP
                    2025-02-18T08:50:39.519571+010020522481A Network Trojan was detected192.168.2.45014892.255.85.369000TCP
                    2025-02-18T08:50:40.316895+010020522481A Network Trojan was detected192.168.2.45014992.255.85.369000TCP
                    2025-02-18T08:50:41.131655+010020522481A Network Trojan was detected192.168.2.45015092.255.85.369000TCP
                    2025-02-18T08:50:41.946317+010020522481A Network Trojan was detected192.168.2.45015192.255.85.369000TCP
                    2025-02-18T08:50:42.767773+010020522481A Network Trojan was detected192.168.2.45015292.255.85.369000TCP
                    2025-02-18T08:50:44.596728+010020522481A Network Trojan was detected192.168.2.45015392.255.85.369000TCP
                    2025-02-18T08:50:45.395055+010020522481A Network Trojan was detected192.168.2.45015492.255.85.369000TCP
                    2025-02-18T08:50:46.224364+010020522481A Network Trojan was detected192.168.2.45015592.255.85.369000TCP
                    2025-02-18T08:50:47.042034+010020522481A Network Trojan was detected192.168.2.45015692.255.85.369000TCP
                    2025-02-18T08:50:47.846572+010020522481A Network Trojan was detected192.168.2.45015792.255.85.369000TCP
                    2025-02-18T08:50:48.644314+010020522481A Network Trojan was detected192.168.2.45015892.255.85.369000TCP
                    2025-02-18T08:50:49.440179+010020522481A Network Trojan was detected192.168.2.45015992.255.85.369000TCP
                    2025-02-18T08:50:50.252254+010020522481A Network Trojan was detected192.168.2.45016092.255.85.369000TCP
                    2025-02-18T08:50:51.073610+010020522481A Network Trojan was detected192.168.2.45016192.255.85.369000TCP
                    2025-02-18T08:50:51.873103+010020522481A Network Trojan was detected192.168.2.45016292.255.85.369000TCP
                    2025-02-18T08:50:52.735185+010020522481A Network Trojan was detected192.168.2.45016392.255.85.369000TCP
                    2025-02-18T08:50:53.534928+010020522481A Network Trojan was detected192.168.2.45016492.255.85.369000TCP
                    2025-02-18T08:50:54.331573+010020522481A Network Trojan was detected192.168.2.45016592.255.85.369000TCP
                    2025-02-18T08:50:55.138981+010020522481A Network Trojan was detected192.168.2.45016692.255.85.369000TCP
                    2025-02-18T08:50:55.945186+010020522481A Network Trojan was detected192.168.2.45016792.255.85.369000TCP
                    2025-02-18T08:50:56.750854+010020522481A Network Trojan was detected192.168.2.45016892.255.85.369000TCP
                    2025-02-18T08:50:57.553084+010020522481A Network Trojan was detected192.168.2.45016992.255.85.369000TCP
                    2025-02-18T08:50:58.348812+010020522481A Network Trojan was detected192.168.2.45017092.255.85.369000TCP
                    2025-02-18T08:50:59.163463+010020522481A Network Trojan was detected192.168.2.45017192.255.85.369000TCP
                    2025-02-18T08:50:59.968384+010020522481A Network Trojan was detected192.168.2.45017292.255.85.369000TCP
                    2025-02-18T08:51:00.767845+010020522481A Network Trojan was detected192.168.2.45017392.255.85.369000TCP
                    2025-02-18T08:51:01.597372+010020522481A Network Trojan was detected192.168.2.45017492.255.85.369000TCP
                    2025-02-18T08:51:02.393174+010020522481A Network Trojan was detected192.168.2.45017592.255.85.369000TCP
                    2025-02-18T08:51:03.191010+010020522481A Network Trojan was detected192.168.2.45017692.255.85.369000TCP
                    2025-02-18T08:51:04.040946+010020522481A Network Trojan was detected192.168.2.45017792.255.85.369000TCP
                    2025-02-18T08:51:04.835627+010020522481A Network Trojan was detected192.168.2.45017892.255.85.369000TCP
                    2025-02-18T08:51:05.652995+010020522481A Network Trojan was detected192.168.2.45017992.255.85.369000TCP
                    2025-02-18T08:51:06.442271+010020522481A Network Trojan was detected192.168.2.45018092.255.85.369000TCP
                    2025-02-18T08:51:07.243041+010020522481A Network Trojan was detected192.168.2.45018192.255.85.369000TCP
                    2025-02-18T08:51:08.036745+010020522481A Network Trojan was detected192.168.2.45018292.255.85.369000TCP
                    2025-02-18T08:51:08.843613+010020522481A Network Trojan was detected192.168.2.45018392.255.85.369000TCP
                    2025-02-18T08:51:09.654668+010020522481A Network Trojan was detected192.168.2.45018592.255.85.369000TCP
                    2025-02-18T08:51:10.481232+010020522481A Network Trojan was detected192.168.2.45018692.255.85.369000TCP
                    2025-02-18T08:51:11.298766+010020522481A Network Trojan was detected192.168.2.45018792.255.85.369000TCP
                    2025-02-18T08:51:12.140120+010020522481A Network Trojan was detected192.168.2.45018892.255.85.369000TCP
                    2025-02-18T08:51:12.985462+010020522481A Network Trojan was detected192.168.2.45018992.255.85.369000TCP
                    2025-02-18T08:51:13.825194+010020522481A Network Trojan was detected192.168.2.45019092.255.85.369000TCP
                    2025-02-18T08:51:14.631577+010020522481A Network Trojan was detected192.168.2.45019192.255.85.369000TCP
                    2025-02-18T08:51:15.439288+010020522481A Network Trojan was detected192.168.2.45019292.255.85.369000TCP
                    2025-02-18T08:51:16.307150+010020522481A Network Trojan was detected192.168.2.45019392.255.85.369000TCP
                    2025-02-18T08:51:17.137600+010020522481A Network Trojan was detected192.168.2.45019492.255.85.369000TCP
                    2025-02-18T08:51:17.958699+010020522481A Network Trojan was detected192.168.2.45019592.255.85.369000TCP
                    2025-02-18T08:51:18.764827+010020522481A Network Trojan was detected192.168.2.45019692.255.85.369000TCP
                    2025-02-18T08:51:19.654533+010020522481A Network Trojan was detected192.168.2.45019792.255.85.369000TCP
                    2025-02-18T08:51:20.462373+010020522481A Network Trojan was detected192.168.2.45019892.255.85.369000TCP
                    2025-02-18T08:51:21.262893+010020522481A Network Trojan was detected192.168.2.45019992.255.85.369000TCP
                    2025-02-18T08:51:22.067330+010020522481A Network Trojan was detected192.168.2.45020092.255.85.369000TCP
                    2025-02-18T08:51:22.875094+010020522481A Network Trojan was detected192.168.2.45020192.255.85.369000TCP
                    2025-02-18T08:51:23.678619+010020522481A Network Trojan was detected192.168.2.45020292.255.85.369000TCP
                    2025-02-18T08:51:24.474811+010020522481A Network Trojan was detected192.168.2.45020392.255.85.369000TCP
                    2025-02-18T08:51:25.455616+010020522481A Network Trojan was detected192.168.2.45020492.255.85.369000TCP
                    2025-02-18T08:51:26.262913+010020522481A Network Trojan was detected192.168.2.45020592.255.85.369000TCP
                    2025-02-18T08:51:27.073205+010020522481A Network Trojan was detected192.168.2.45020692.255.85.369000TCP
                    2025-02-18T08:51:27.928205+010020522481A Network Trojan was detected192.168.2.45020792.255.85.369000TCP
                    2025-02-18T08:51:28.790379+010020522481A Network Trojan was detected192.168.2.45020892.255.85.369000TCP
                    2025-02-18T08:51:29.584274+010020522481A Network Trojan was detected192.168.2.45020992.255.85.369000TCP
                    2025-02-18T08:51:30.418867+010020522481A Network Trojan was detected192.168.2.45021092.255.85.369000TCP
                    2025-02-18T08:51:31.272219+010020522481A Network Trojan was detected192.168.2.45021192.255.85.369000TCP
                    2025-02-18T08:51:32.088542+010020522481A Network Trojan was detected192.168.2.45021292.255.85.369000TCP
                    2025-02-18T08:51:32.881743+010020522481A Network Trojan was detected192.168.2.45021392.255.85.369000TCP
                    2025-02-18T08:51:33.686804+010020522481A Network Trojan was detected192.168.2.45021492.255.85.369000TCP
                    2025-02-18T08:51:34.501477+010020522481A Network Trojan was detected192.168.2.45021592.255.85.369000TCP
                    2025-02-18T08:51:35.318603+010020522481A Network Trojan was detected192.168.2.45021692.255.85.369000TCP
                    2025-02-18T08:51:36.134620+010020522481A Network Trojan was detected192.168.2.45021892.255.85.369000TCP
                    2025-02-18T08:51:36.931221+010020522481A Network Trojan was detected192.168.2.45021992.255.85.369000TCP
                    2025-02-18T08:51:37.725818+010020522481A Network Trojan was detected192.168.2.45022092.255.85.369000TCP
                    2025-02-18T08:51:38.540226+010020522481A Network Trojan was detected192.168.2.45022192.255.85.369000TCP
                    2025-02-18T08:51:39.355934+010020522481A Network Trojan was detected192.168.2.45022292.255.85.369000TCP
                    2025-02-18T08:51:40.147218+010020522481A Network Trojan was detected192.168.2.45022392.255.85.369000TCP
                    2025-02-18T08:51:40.954827+010020522481A Network Trojan was detected192.168.2.45022492.255.85.369000TCP
                    2025-02-18T08:51:41.791953+010020522481A Network Trojan was detected192.168.2.45022592.255.85.369000TCP
                    2025-02-18T08:51:42.595447+010020522481A Network Trojan was detected192.168.2.45022692.255.85.369000TCP
                    2025-02-18T08:51:43.395759+010020522481A Network Trojan was detected192.168.2.45022792.255.85.369000TCP
                    2025-02-18T08:51:44.226309+010020522481A Network Trojan was detected192.168.2.45022892.255.85.369000TCP
                    2025-02-18T08:51:45.024972+010020522481A Network Trojan was detected192.168.2.45022992.255.85.369000TCP
                    2025-02-18T08:51:45.839723+010020522481A Network Trojan was detected192.168.2.45023092.255.85.369000TCP
                    2025-02-18T08:51:46.648845+010020522481A Network Trojan was detected192.168.2.45023192.255.85.369000TCP
                    2025-02-18T08:51:47.443552+010020522481A Network Trojan was detected192.168.2.45023292.255.85.369000TCP
                    2025-02-18T08:51:48.258915+010020522481A Network Trojan was detected192.168.2.45023392.255.85.369000TCP
                    2025-02-18T08:51:49.074296+010020522481A Network Trojan was detected192.168.2.45023492.255.85.369000TCP
                    2025-02-18T08:51:49.864311+010020522481A Network Trojan was detected192.168.2.45023592.255.85.369000TCP
                    2025-02-18T08:51:50.663728+010020522481A Network Trojan was detected192.168.2.45023692.255.85.369000TCP
                    2025-02-18T08:51:51.467782+010020522481A Network Trojan was detected192.168.2.45023792.255.85.369000TCP
                    2025-02-18T08:51:52.291580+010020522481A Network Trojan was detected192.168.2.45023892.255.85.369000TCP
                    2025-02-18T08:51:53.102885+010020522481A Network Trojan was detected192.168.2.45023992.255.85.369000TCP
                    2025-02-18T08:51:53.895910+010020522481A Network Trojan was detected192.168.2.45024092.255.85.369000TCP
                    2025-02-18T08:51:54.721527+010020522481A Network Trojan was detected192.168.2.45024192.255.85.369000TCP
                    2025-02-18T08:51:55.521913+010020522481A Network Trojan was detected192.168.2.45024292.255.85.369000TCP
                    2025-02-18T08:51:56.345400+010020522481A Network Trojan was detected192.168.2.45024392.255.85.369000TCP
                    2025-02-18T08:51:57.166669+010020522481A Network Trojan was detected192.168.2.45024492.255.85.369000TCP
                    2025-02-18T08:51:57.975131+010020522481A Network Trojan was detected192.168.2.45024592.255.85.369000TCP
                    2025-02-18T08:51:58.794034+010020522481A Network Trojan was detected192.168.2.45024692.255.85.369000TCP
                    2025-02-18T08:51:59.652909+010020522481A Network Trojan was detected192.168.2.45024792.255.85.369000TCP
                    2025-02-18T08:52:00.443500+010020522481A Network Trojan was detected192.168.2.45024892.255.85.369000TCP
                    2025-02-18T08:52:01.243493+010020522481A Network Trojan was detected192.168.2.45024992.255.85.369000TCP
                    2025-02-18T08:52:02.035569+010020522481A Network Trojan was detected192.168.2.45025092.255.85.369000TCP
                    2025-02-18T08:52:02.858459+010020522481A Network Trojan was detected192.168.2.45025192.255.85.369000TCP
                    2025-02-18T08:52:03.677912+010020522481A Network Trojan was detected192.168.2.45025292.255.85.369000TCP
                    2025-02-18T08:52:04.502783+010020522481A Network Trojan was detected192.168.2.45025392.255.85.369000TCP
                    2025-02-18T08:52:05.307011+010020522481A Network Trojan was detected192.168.2.45025492.255.85.369000TCP
                    2025-02-18T08:52:06.113952+010020522481A Network Trojan was detected192.168.2.45025592.255.85.369000TCP
                    2025-02-18T08:52:06.925289+010020522481A Network Trojan was detected192.168.2.45025692.255.85.369000TCP
                    2025-02-18T08:52:07.753274+010020522481A Network Trojan was detected192.168.2.45025792.255.85.369000TCP
                    2025-02-18T08:52:08.561382+010020522481A Network Trojan was detected192.168.2.45025892.255.85.369000TCP
                    2025-02-18T08:52:09.375413+010020522481A Network Trojan was detected192.168.2.45025992.255.85.369000TCP
                    2025-02-18T08:52:10.177650+010020522481A Network Trojan was detected192.168.2.45026092.255.85.369000TCP
                    2025-02-18T08:52:10.976486+010020522481A Network Trojan was detected192.168.2.45026192.255.85.369000TCP
                    2025-02-18T08:52:11.789355+010020522481A Network Trojan was detected192.168.2.45026292.255.85.369000TCP
                    2025-02-18T08:52:12.594211+010020522481A Network Trojan was detected192.168.2.45026392.255.85.369000TCP
                    2025-02-18T08:52:13.396451+010020522481A Network Trojan was detected192.168.2.45026592.255.85.369000TCP
                    2025-02-18T08:52:14.201416+010020522481A Network Trojan was detected192.168.2.45026692.255.85.369000TCP
                    2025-02-18T08:52:15.008577+010020522481A Network Trojan was detected192.168.2.45026792.255.85.369000TCP
                    2025-02-18T08:52:15.807903+010020522481A Network Trojan was detected192.168.2.45026892.255.85.369000TCP
                    2025-02-18T08:52:16.599429+010020522481A Network Trojan was detected192.168.2.45026992.255.85.369000TCP
                    2025-02-18T08:52:17.398651+010020522481A Network Trojan was detected192.168.2.45027092.255.85.369000TCP
                    2025-02-18T08:52:18.211329+010020522481A Network Trojan was detected192.168.2.45027192.255.85.369000TCP
                    2025-02-18T08:52:19.005969+010020522481A Network Trojan was detected192.168.2.45027292.255.85.369000TCP
                    2025-02-18T08:52:19.837021+010020522481A Network Trojan was detected192.168.2.45027392.255.85.369000TCP
                    2025-02-18T08:52:20.630714+010020522481A Network Trojan was detected192.168.2.45027492.255.85.369000TCP
                    2025-02-18T08:52:21.436481+010020522481A Network Trojan was detected192.168.2.45027592.255.85.369000TCP
                    2025-02-18T08:52:22.271901+010020522481A Network Trojan was detected192.168.2.45027692.255.85.369000TCP
                    2025-02-18T08:52:23.069421+010020522481A Network Trojan was detected192.168.2.45027792.255.85.369000TCP
                    2025-02-18T08:52:23.895556+010020522481A Network Trojan was detected192.168.2.45027892.255.85.369000TCP
                    2025-02-18T08:52:24.716488+010020522481A Network Trojan was detected192.168.2.45027992.255.85.369000TCP
                    2025-02-18T08:52:25.540152+010020522481A Network Trojan was detected192.168.2.45028092.255.85.369000TCP
                    2025-02-18T08:52:26.342628+010020522481A Network Trojan was detected192.168.2.45028192.255.85.369000TCP
                    2025-02-18T08:52:27.166320+010020522481A Network Trojan was detected192.168.2.45028292.255.85.369000TCP
                    2025-02-18T08:52:27.978613+010020522481A Network Trojan was detected192.168.2.45028392.255.85.369000TCP
                    2025-02-18T08:52:28.784308+010020522481A Network Trojan was detected192.168.2.45028492.255.85.369000TCP
                    2025-02-18T08:52:29.603902+010020522481A Network Trojan was detected192.168.2.45028592.255.85.369000TCP
                    2025-02-18T08:52:30.432153+010020522481A Network Trojan was detected192.168.2.45028692.255.85.369000TCP
                    2025-02-18T08:52:31.251284+010020522481A Network Trojan was detected192.168.2.45028792.255.85.369000TCP
                    2025-02-18T08:52:32.073716+010020522481A Network Trojan was detected192.168.2.45028892.255.85.369000TCP
                    2025-02-18T08:52:32.914494+010020522481A Network Trojan was detected192.168.2.45028992.255.85.369000TCP
                    2025-02-18T08:52:33.752939+010020522481A Network Trojan was detected192.168.2.45029092.255.85.369000TCP
                    2025-02-18T08:52:34.572972+010020522481A Network Trojan was detected192.168.2.45029192.255.85.369000TCP
                    2025-02-18T08:52:35.374398+010020522481A Network Trojan was detected192.168.2.45029292.255.85.369000TCP
                    2025-02-18T08:52:36.191658+010020522481A Network Trojan was detected192.168.2.45029392.255.85.369000TCP
                    2025-02-18T08:52:37.013832+010020522481A Network Trojan was detected192.168.2.45029492.255.85.369000TCP
                    2025-02-18T08:52:37.865643+010020522481A Network Trojan was detected192.168.2.45029592.255.85.369000TCP
                    2025-02-18T08:52:38.673622+010020522481A Network Trojan was detected192.168.2.45029692.255.85.369000TCP
                    2025-02-18T08:52:39.478320+010020522481A Network Trojan was detected192.168.2.45029792.255.85.369000TCP
                    2025-02-18T08:52:40.271977+010020522481A Network Trojan was detected192.168.2.45029892.255.85.369000TCP
                    2025-02-18T08:52:41.068454+010020522481A Network Trojan was detected192.168.2.45029992.255.85.369000TCP
                    2025-02-18T08:52:41.883787+010020522481A Network Trojan was detected192.168.2.45030092.255.85.369000TCP
                    2025-02-18T08:52:42.682186+010020522481A Network Trojan was detected192.168.2.45030192.255.85.369000TCP
                    2025-02-18T08:52:43.496186+010020522481A Network Trojan was detected192.168.2.45030292.255.85.369000TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-02-18T08:48:44.018987+010028033053Unknown Traffic192.168.2.44973392.255.85.369000TCP
                    2025-02-18T08:48:45.671555+010028033053Unknown Traffic192.168.2.44973592.255.85.369000TCP
                    2025-02-18T08:48:47.310649+010028033053Unknown Traffic192.168.2.44973792.255.85.369000TCP
                    2025-02-18T08:48:52.158397+010028033053Unknown Traffic192.168.2.44974392.255.85.369000TCP
                    2025-02-18T08:48:53.755386+010028033053Unknown Traffic192.168.2.44974592.255.85.369000TCP
                    2025-02-18T08:48:56.998495+010028033053Unknown Traffic192.168.2.44975092.255.85.369000TCP
                    2025-02-18T08:49:00.309147+010028033053Unknown Traffic192.168.2.44975892.255.85.369000TCP
                    2025-02-18T08:49:03.566922+010028033053Unknown Traffic192.168.2.44976392.255.85.369000TCP
                    2025-02-18T08:49:05.172587+010028033053Unknown Traffic192.168.2.44976592.255.85.369000TCP
                    2025-02-18T08:49:06.789332+010028033053Unknown Traffic192.168.2.44976792.255.85.369000TCP
                    2025-02-18T08:49:07.593223+010028033053Unknown Traffic192.168.2.44976892.255.85.369000TCP
                    2025-02-18T08:49:09.208980+010028033053Unknown Traffic192.168.2.44977092.255.85.369000TCP
                    2025-02-18T08:49:15.717381+010028033053Unknown Traffic192.168.2.44977892.255.85.369000TCP
                    2025-02-18T08:49:16.521991+010028033053Unknown Traffic192.168.2.44977992.255.85.369000TCP
                    2025-02-18T08:49:18.926992+010028033053Unknown Traffic192.168.2.44978292.255.85.369000TCP
                    2025-02-18T08:49:19.730902+010028033053Unknown Traffic192.168.2.44978392.255.85.369000TCP
                    2025-02-18T08:49:20.543062+010028033053Unknown Traffic192.168.2.44978492.255.85.369000TCP
                    2025-02-18T08:49:21.539017+010028033053Unknown Traffic192.168.2.44978592.255.85.369000TCP
                    2025-02-18T08:49:23.138213+010028033053Unknown Traffic192.168.2.44978792.255.85.369000TCP
                    2025-02-18T08:49:24.753056+010028033053Unknown Traffic192.168.2.44978992.255.85.369000TCP
                    2025-02-18T08:49:28.779183+010028033053Unknown Traffic192.168.2.44979492.255.85.369000TCP
                    2025-02-18T08:49:29.583197+010028033053Unknown Traffic192.168.2.44979592.255.85.369000TCP
                    2025-02-18T08:49:35.243330+010028033053Unknown Traffic192.168.2.44980292.255.85.369000TCP
                    2025-02-18T08:49:37.682634+010028033053Unknown Traffic192.168.2.44981292.255.85.369000TCP
                    2025-02-18T08:49:38.552088+010028033053Unknown Traffic192.168.2.44981892.255.85.369000TCP
                    2025-02-18T08:49:39.367037+010028033053Unknown Traffic192.168.2.44982492.255.85.369000TCP
                    2025-02-18T08:49:40.162130+010028033053Unknown Traffic192.168.2.44983092.255.85.369000TCP
                    2025-02-18T08:49:40.991047+010028033053Unknown Traffic192.168.2.44983692.255.85.369000TCP
                    2025-02-18T08:49:41.812466+010028033053Unknown Traffic192.168.2.44984092.255.85.369000TCP
                    2025-02-18T08:49:42.617640+010028033053Unknown Traffic192.168.2.44984892.255.85.369000TCP
                    2025-02-18T08:49:44.247380+010028033053Unknown Traffic192.168.2.44986092.255.85.369000TCP
                    2025-02-18T08:49:46.671235+010028033053Unknown Traffic192.168.2.44987892.255.85.369000TCP
                    2025-02-18T08:49:47.495673+010028033053Unknown Traffic192.168.2.44988492.255.85.369000TCP
                    2025-02-18T08:49:49.110193+010028033053Unknown Traffic192.168.2.44989692.255.85.369000TCP
                    2025-02-18T08:49:49.916384+010028033053Unknown Traffic192.168.2.44990292.255.85.369000TCP
                    2025-02-18T08:49:50.709224+010028033053Unknown Traffic192.168.2.44990892.255.85.369000TCP
                    2025-02-18T08:49:52.327719+010028033053Unknown Traffic192.168.2.44992092.255.85.369000TCP
                    2025-02-18T08:49:53.162016+010028033053Unknown Traffic192.168.2.44992792.255.85.369000TCP
                    2025-02-18T08:49:53.960511+010028033053Unknown Traffic192.168.2.44993392.255.85.369000TCP
                    2025-02-18T08:49:54.784221+010028033053Unknown Traffic192.168.2.44993992.255.85.369000TCP
                    2025-02-18T08:49:55.582182+010028033053Unknown Traffic192.168.2.44994592.255.85.369000TCP
                    2025-02-18T08:49:56.409884+010028033053Unknown Traffic192.168.2.44995192.255.85.369000TCP
                    2025-02-18T08:49:57.210943+010028033053Unknown Traffic192.168.2.44995792.255.85.369000TCP
                    2025-02-18T08:49:58.819358+010028033053Unknown Traffic192.168.2.44996992.255.85.369000TCP
                    2025-02-18T08:49:59.648662+010028033053Unknown Traffic192.168.2.44997592.255.85.369000TCP
                    2025-02-18T08:50:00.470948+010028033053Unknown Traffic192.168.2.44998292.255.85.369000TCP
                    2025-02-18T08:50:01.269988+010028033053Unknown Traffic192.168.2.44998892.255.85.369000TCP
                    2025-02-18T08:50:02.091375+010028033053Unknown Traffic192.168.2.44999492.255.85.369000TCP
                    2025-02-18T08:50:02.971438+010028033053Unknown Traffic192.168.2.45000092.255.85.369000TCP
                    2025-02-18T08:50:04.601048+010028033053Unknown Traffic192.168.2.45001692.255.85.369000TCP
                    2025-02-18T08:50:05.454485+010028033053Unknown Traffic192.168.2.45002292.255.85.369000TCP
                    2025-02-18T08:50:07.092777+010028033053Unknown Traffic192.168.2.45003492.255.85.369000TCP
                    2025-02-18T08:50:07.902635+010028033053Unknown Traffic192.168.2.45004092.255.85.369000TCP
                    2025-02-18T08:50:08.725530+010028033053Unknown Traffic192.168.2.45004492.255.85.369000TCP
                    2025-02-18T08:50:09.532888+010028033053Unknown Traffic192.168.2.45005092.255.85.369000TCP
                    2025-02-18T08:50:13.586408+010028033053Unknown Traffic192.168.2.45007892.255.85.369000TCP
                    2025-02-18T08:50:14.433818+010028033053Unknown Traffic192.168.2.45008392.255.85.369000TCP
                    2025-02-18T08:50:15.247186+010028033053Unknown Traffic192.168.2.45008992.255.85.369000TCP
                    2025-02-18T08:50:17.709517+010028033053Unknown Traffic192.168.2.45010792.255.85.369000TCP
                    2025-02-18T08:50:20.137218+010028033053Unknown Traffic192.168.2.45012492.255.85.369000TCP
                    2025-02-18T08:50:20.948900+010028033053Unknown Traffic192.168.2.45012592.255.85.369000TCP
                    2025-02-18T08:50:24.985080+010028033053Unknown Traffic192.168.2.45013092.255.85.369000TCP
                    2025-02-18T08:50:27.385152+010028033053Unknown Traffic192.168.2.45013392.255.85.369000TCP
                    2025-02-18T08:50:29.026099+010028033053Unknown Traffic192.168.2.45013592.255.85.369000TCP
                    2025-02-18T08:50:30.639131+010028033053Unknown Traffic192.168.2.45013792.255.85.369000TCP
                    2025-02-18T08:50:31.442526+010028033053Unknown Traffic192.168.2.45013892.255.85.369000TCP
                    2025-02-18T08:50:33.062237+010028033053Unknown Traffic192.168.2.45014092.255.85.369000TCP
                    2025-02-18T08:50:35.466625+010028033053Unknown Traffic192.168.2.45014392.255.85.369000TCP
                    2025-02-18T08:50:39.519571+010028033053Unknown Traffic192.168.2.45014892.255.85.369000TCP
                    2025-02-18T08:50:41.131655+010028033053Unknown Traffic192.168.2.45015092.255.85.369000TCP
                    2025-02-18T08:50:41.946317+010028033053Unknown Traffic192.168.2.45015192.255.85.369000TCP
                    2025-02-18T08:50:46.224364+010028033053Unknown Traffic192.168.2.45015592.255.85.369000TCP
                    2025-02-18T08:50:48.644314+010028033053Unknown Traffic192.168.2.45015892.255.85.369000TCP
                    2025-02-18T08:50:51.873103+010028033053Unknown Traffic192.168.2.45016292.255.85.369000TCP
                    2025-02-18T08:50:53.534928+010028033053Unknown Traffic192.168.2.45016492.255.85.369000TCP
                    2025-02-18T08:50:55.945186+010028033053Unknown Traffic192.168.2.45016792.255.85.369000TCP
                    2025-02-18T08:50:59.163463+010028033053Unknown Traffic192.168.2.45017192.255.85.369000TCP
                    2025-02-18T08:51:02.393174+010028033053Unknown Traffic192.168.2.45017592.255.85.369000TCP
                    2025-02-18T08:51:04.040946+010028033053Unknown Traffic192.168.2.45017792.255.85.369000TCP
                    2025-02-18T08:51:04.835627+010028033053Unknown Traffic192.168.2.45017892.255.85.369000TCP
                    2025-02-18T08:51:07.243041+010028033053Unknown Traffic192.168.2.45018192.255.85.369000TCP
                    2025-02-18T08:51:10.481232+010028033053Unknown Traffic192.168.2.45018692.255.85.369000TCP
                    2025-02-18T08:51:12.140120+010028033053Unknown Traffic192.168.2.45018892.255.85.369000TCP
                    2025-02-18T08:51:13.825194+010028033053Unknown Traffic192.168.2.45019092.255.85.369000TCP
                    2025-02-18T08:51:15.439288+010028033053Unknown Traffic192.168.2.45019292.255.85.369000TCP
                    2025-02-18T08:51:16.307150+010028033053Unknown Traffic192.168.2.45019392.255.85.369000TCP
                    2025-02-18T08:51:17.958699+010028033053Unknown Traffic192.168.2.45019592.255.85.369000TCP
                    2025-02-18T08:51:20.462373+010028033053Unknown Traffic192.168.2.45019892.255.85.369000TCP
                    2025-02-18T08:51:22.067330+010028033053Unknown Traffic192.168.2.45020092.255.85.369000TCP
                    2025-02-18T08:51:22.875094+010028033053Unknown Traffic192.168.2.45020192.255.85.369000TCP
                    2025-02-18T08:51:25.455616+010028033053Unknown Traffic192.168.2.45020492.255.85.369000TCP
                    2025-02-18T08:51:27.073205+010028033053Unknown Traffic192.168.2.45020692.255.85.369000TCP
                    2025-02-18T08:51:28.790379+010028033053Unknown Traffic192.168.2.45020892.255.85.369000TCP
                    2025-02-18T08:51:30.418867+010028033053Unknown Traffic192.168.2.45021092.255.85.369000TCP
                    2025-02-18T08:51:31.272219+010028033053Unknown Traffic192.168.2.45021192.255.85.369000TCP
                    2025-02-18T08:51:32.088542+010028033053Unknown Traffic192.168.2.45021292.255.85.369000TCP
                    2025-02-18T08:51:34.501477+010028033053Unknown Traffic192.168.2.45021592.255.85.369000TCP
                    2025-02-18T08:51:35.318603+010028033053Unknown Traffic192.168.2.45021692.255.85.369000TCP
                    2025-02-18T08:51:38.540226+010028033053Unknown Traffic192.168.2.45022192.255.85.369000TCP
                    2025-02-18T08:51:40.147218+010028033053Unknown Traffic192.168.2.45022392.255.85.369000TCP
                    2025-02-18T08:51:41.791953+010028033053Unknown Traffic192.168.2.45022592.255.85.369000TCP
                    2025-02-18T08:51:44.226309+010028033053Unknown Traffic192.168.2.45022892.255.85.369000TCP
                    2025-02-18T08:51:46.648845+010028033053Unknown Traffic192.168.2.45023192.255.85.369000TCP
                    2025-02-18T08:51:47.443552+010028033053Unknown Traffic192.168.2.45023292.255.85.369000TCP
                    2025-02-18T08:51:48.258915+010028033053Unknown Traffic192.168.2.45023392.255.85.369000TCP
                    2025-02-18T08:51:49.864311+010028033053Unknown Traffic192.168.2.45023592.255.85.369000TCP
                    2025-02-18T08:51:52.291580+010028033053Unknown Traffic192.168.2.45023892.255.85.369000TCP
                    2025-02-18T08:51:53.895910+010028033053Unknown Traffic192.168.2.45024092.255.85.369000TCP
                    2025-02-18T08:51:56.345400+010028033053Unknown Traffic192.168.2.45024392.255.85.369000TCP
                    2025-02-18T08:51:57.166669+010028033053Unknown Traffic192.168.2.45024492.255.85.369000TCP
                    2025-02-18T08:51:59.652909+010028033053Unknown Traffic192.168.2.45024792.255.85.369000TCP
                    2025-02-18T08:52:01.243493+010028033053Unknown Traffic192.168.2.45024992.255.85.369000TCP
                    2025-02-18T08:52:02.858459+010028033053Unknown Traffic192.168.2.45025192.255.85.369000TCP
                    2025-02-18T08:52:07.753274+010028033053Unknown Traffic192.168.2.45025792.255.85.369000TCP
                    2025-02-18T08:52:09.375413+010028033053Unknown Traffic192.168.2.45025992.255.85.369000TCP
                    2025-02-18T08:52:10.976486+010028033053Unknown Traffic192.168.2.45026192.255.85.369000TCP
                    2025-02-18T08:52:15.008577+010028033053Unknown Traffic192.168.2.45026792.255.85.369000TCP
                    2025-02-18T08:52:16.599429+010028033053Unknown Traffic192.168.2.45026992.255.85.369000TCP
                    2025-02-18T08:52:21.436481+010028033053Unknown Traffic192.168.2.45027592.255.85.369000TCP
                    2025-02-18T08:52:23.895556+010028033053Unknown Traffic192.168.2.45027892.255.85.369000TCP
                    2025-02-18T08:52:26.342628+010028033053Unknown Traffic192.168.2.45028192.255.85.369000TCP
                    2025-02-18T08:52:27.166320+010028033053Unknown Traffic192.168.2.45028292.255.85.369000TCP
                    2025-02-18T08:52:27.978613+010028033053Unknown Traffic192.168.2.45028392.255.85.369000TCP
                    2025-02-18T08:52:30.432153+010028033053Unknown Traffic192.168.2.45028692.255.85.369000TCP
                    2025-02-18T08:52:31.251284+010028033053Unknown Traffic192.168.2.45028792.255.85.369000TCP
                    2025-02-18T08:52:32.073716+010028033053Unknown Traffic192.168.2.45028892.255.85.369000TCP
                    2025-02-18T08:52:33.752939+010028033053Unknown Traffic192.168.2.45029092.255.85.369000TCP
                    2025-02-18T08:52:42.682186+010028033053Unknown Traffic192.168.2.45030192.255.85.369000TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: VIkn1bnYkP.exeAvira: detected
                    Source: VIkn1bnYkP.exeVirustotal: Detection: 76%Perma Link
                    Source: VIkn1bnYkP.exeReversingLabs: Detection: 70%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: VIkn1bnYkP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 4x nop then jmp 06CD9ADCh0_2_06CD94AE
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 4x nop then jmp 06CD9ADCh0_2_06CD9AB8

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49737 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49746 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49739 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49748 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49743 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49740 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49761 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49738 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49736 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49766 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49745 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49744 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49754 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49741 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49760 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49765 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49758 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49764 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49742 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49747 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49762 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49732 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49768 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49774 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49750 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49777 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49773 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49779 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49778 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49771 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49776 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49734 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49780 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49735 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49775 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49783 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49757 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49786 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49785 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49751 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49770 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49733 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49788 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49767 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49790 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49781 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49772 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49787 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49782 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49784 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49792 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49791 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49789 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49793 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49769 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49794 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49796 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49797 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49795 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49798 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49799 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49800 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49805 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49801 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49802 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49806 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49812 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49818 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49763 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49824 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49830 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49836 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49840 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49848 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49854 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49860 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49866 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49872 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49878 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49884 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49902 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49908 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49914 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49920 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49927 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49933 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49939 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49945 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49957 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49951 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49963 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49969 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49890 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49982 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49975 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49896 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49988 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49994 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50000 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50007 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50016 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50028 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50022 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50034 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50044 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50062 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50050 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50056 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50068 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50074 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50083 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50089 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50095 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50040 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50107 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50113 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50119 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50124 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50125 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50126 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50127 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50129 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50078 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50130 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50128 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50131 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50132 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50101 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50133 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50134 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50135 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50136 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50137 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50138 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50139 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50141 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50144 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50143 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50142 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50145 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50147 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50148 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50146 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50150 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50149 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50151 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50152 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50153 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50154 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50155 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50156 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50158 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50157 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50159 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50160 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50161 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50162 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50164 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50163 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50165 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50166 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50167 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50168 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50169 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50170 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50171 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50172 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50174 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50175 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50176 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50177 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50178 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50179 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50180 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50181 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50182 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50183 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50185 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50186 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50187 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50188 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50189 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50190 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50191 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50192 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50193 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50194 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50195 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50196 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50197 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50198 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50199 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50200 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50202 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50203 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50204 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50205 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50206 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50207 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50208 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50209 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50210 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50211 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50212 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50213 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50214 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50215 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50140 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50218 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50219 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50221 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50222 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50223 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50224 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50225 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50226 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50228 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50229 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50230 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50231 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50232 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50233 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50201 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50234 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50235 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50237 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50239 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50240 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50241 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50242 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50243 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50244 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50227 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50245 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50246 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50248 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50249 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50250 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50251 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50252 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50253 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50254 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50255 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50256 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50257 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50258 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50259 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50261 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50262 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50263 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50265 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50266 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50268 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50269 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50270 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50271 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50272 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50273 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50274 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50275 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50276 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50277 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50278 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50279 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50280 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50281 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50282 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50283 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50284 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50285 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50286 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50287 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50288 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50289 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50290 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50291 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50293 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50292 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50294 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50295 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50238 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50296 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50297 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50298 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50299 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50300 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50301 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50302 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50220 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50247 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50260 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50267 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50173 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50216 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50236 -> 92.255.85.36:9000
                    Source: global trafficTCP traffic: 92.255.85.36 ports 9000,1,4,5,7,8,15847
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49733
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49734
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49735
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49736
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49737
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49740
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49741
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49743
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49744
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49745
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49746
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49747
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49748
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49750
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49751
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49754
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49757
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49758
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49760
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49761
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49762
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49763
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49764
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49765
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49767
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49768
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49769
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49770
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49771
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49772
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49773
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49774
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49775
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49776
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49777
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49778
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49779
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49780
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49781
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49782
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49783
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49784
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49785
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49786
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49787
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49788
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49789
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49790
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49791
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49792
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49793
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49794
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49795
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49796
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49797
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49798
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49799
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49800
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49801
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49802
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49805
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49806
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49812
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49818
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49824
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49830
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49836
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49840
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49848
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49854
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49860
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49866
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49872
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49878
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49884
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49890
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49896
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49902
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49908
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49914
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49920
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49927
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49933
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49939
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49945
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49951
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49957
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49963 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49963
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49969 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49969
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49975
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49982
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49988
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49994
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50007
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50016
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50022
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50028
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50034
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50040
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50044
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50050 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50050
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50056
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50062
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50068
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50074
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50078
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50083
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50089
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50095
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50101 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50101
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50107
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50113
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50119
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50124 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50124
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50125
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50126
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50127
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50128
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50129
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50130
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50131
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50132
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50133
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50134
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50135
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50136
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50137 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50137
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50138
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50139 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50139
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50140 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50140
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50141
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50142 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50142
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50143 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50143
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50144 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50144
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50145 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50145
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50146 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50146
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50147 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50147
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50148 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50148
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50149 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50149
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50150 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50150
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50151 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50151
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50152 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50152
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50153
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50154 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50154
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50155 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50155
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50156
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50157 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50157
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50158 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50158
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50159 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50159
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50160
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50161
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50162 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50162
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50163 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50163
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50164 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50164
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50165
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50166 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50166
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50167 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50167
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50168 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50168
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50169 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50169
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50170 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50170
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50171 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50171
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50172 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50172
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50173
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50174
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50175 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50175
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50176 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50176
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50177
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50178 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50178
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50179 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50179
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50180 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50180
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50181 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50181
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50182 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50182
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50183
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50185
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50186 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50186
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50187
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50188 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50188
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50189 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50189
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50190 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50190
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50191 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50191
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50192 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50192
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50193
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50194 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50194
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50195 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50195
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50196 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50196
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50197
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50198 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50198
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50199 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50199
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50200 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50200
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50201 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50201
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50202 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50202
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50203 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50203
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50204 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50204
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50205
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50206 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50206
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50207 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50207
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50208 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50208
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50209 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50209
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50210 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50210
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50211
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50212 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50212
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50213
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50214
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50215
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50216 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50216
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50218 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50218
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50219
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50220 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50220
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50221 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50221
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50222 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50222
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50223
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50224 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50224
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50225
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50226 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50226
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50227 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50227
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50228 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50228
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50229 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50229
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50230
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50231 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50231
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50232
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50233
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50234
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50235
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50236 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50236
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50237 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50237
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50238 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50238
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50239 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50239
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50240
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50241
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50242
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50243 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50243
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50244 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50244
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50245 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50245
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50246 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50246
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50247 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50247
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50248 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50248
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50249 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50249
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50250 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50250
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50251 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50251
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50252 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50252
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50253 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50253
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50254 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50254
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50255 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50255
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50256 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50256
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 92.255.85.36:15847
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: Joe Sandbox ViewASN Name: SOVTEL-ASRU SOVTEL-ASRU
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49737 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49743 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49745 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49765 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49758 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49768 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49750 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49779 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49778 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49735 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49783 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49785 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49770 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49733 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49767 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49784 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49787 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49782 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49789 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49794 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49795 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49802 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49812 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49818 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49763 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49824 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49830 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49836 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49840 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49848 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49860 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49878 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49884 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49902 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49908 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49920 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49927 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49933 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49939 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49945 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49957 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49951 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49969 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49982 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49975 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49896 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49988 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49994 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50000 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50016 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50022 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50034 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50044 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50050 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50083 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50089 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50040 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50107 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50124 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50125 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50078 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50130 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50133 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50135 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50137 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50138 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50143 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50148 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50150 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50151 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50155 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50158 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50162 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50164 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50167 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50171 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50175 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50177 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50178 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50181 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50186 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50188 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50190 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50192 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50193 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50195 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50198 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50200 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50204 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50206 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50208 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50210 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50211 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50212 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50215 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50140 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50221 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50223 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50225 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50228 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50231 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50232 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50233 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50201 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50235 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50240 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50243 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50244 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50249 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50251 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50257 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50259 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50261 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50269 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50275 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50278 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50281 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50282 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50283 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50286 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50287 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50288 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50290 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50238 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50301 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50247 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50267 -> 92.255.85.36:9000
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50216 -> 92.255.85.36:9000
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.36
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000
                    Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.36:9000Connection: Keep-Alive
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.00000000029C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://92.255.85.36:9000
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.00000000029C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://92.255.85.36:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/DWCCqGB0
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E22000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                    System Summary

                    barindex
                    Source: VIkn1bnYkP.exe, type: SAMPLEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: 0.0.VIkn1bnYkP.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE188E0_2_00FE188E
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE54B80_2_00FE54B8
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE9E780_2_00FE9E78
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FEB7C80_2_00FEB7C8
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE4B340_2_00FE4B34
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE54880_2_00FE5488
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FED6EB0_2_00FED6EB
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE9E670_2_00FE9E67
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FEB7B90_2_00FEB7B9
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE97A10_2_00FE97A1
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE77500_2_00FE7750
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FE77400_2_00FE7740
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_00FED7380_2_00FED738
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED04480_2_04ED0448
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED04390_2_04ED0439
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED14100_2_04ED1410
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED37180_2_04ED3718
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED13F20_2_04ED13F2
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED9C080_2_04ED9C08
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED9BF70_2_04ED9BF7
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B05EAE0_2_06B05EAE
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B032FA0_2_06B032FA
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B06E090_2_06B06E09
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B0E7700_2_06B0E770
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B07B4F0_2_06B07B4F
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B059A00_2_06B059A0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B0D9780_2_06B0D978
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B085600_2_06B08560
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B00D400_2_06B00D40
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B002B70_2_06B002B7
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B002C80_2_06B002C8
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B091900_2_06B09190
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B059920_2_06B05992
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B00D3D0_2_06B00D3D
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B0D9630_2_06B0D963
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA72800_2_06BA7280
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA6A580_2_06BA6A58
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BACF570_2_06BACF57
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BAC49A0_2_06BAC49A
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BAE8600_2_06BAE860
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA98480_2_06BA9848
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA86F00_2_06BA86F0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA86E20_2_06BA86E2
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA52700_2_06BA5270
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA52600_2_06BA5260
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA3FB80_2_06BA3FB8
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA3FA80_2_06BA3FA8
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BABC800_2_06BABC80
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BAE4E00_2_06BAE4E0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA98380_2_06BA9838
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD23D00_2_06CD23D0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD10E00_2_06CD10E0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD00400_2_06CD0040
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD31D00_2_06CD31D0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD3E800_2_06CD3E80
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD8D880_2_06CD8D88
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD28F80_2_06CD28F8
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD23C00_2_06CD23C0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD10D00_2_06CD10D0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD00060_2_06CD0006
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD31C00_2_06CD31C0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD5E700_2_06CD5E70
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD9B4F0_2_06CD9B4F
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06CD28DE0_2_06CD28DE
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_07301EF80_2_07301EF8
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_073006D00_2_073006D0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_073056CC0_2_073056CC
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_073091900_2_07309190
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_073091800_2_07309180
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED36F30_2_04ED36F3
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED82F00_2_04ED82F0
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04ED83600_2_04ED8360
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04EDB8F10_2_04EDB8F1
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_04EDB9000_2_04EDB900
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4136726844.0000000006E29000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000000.1689608878.0000000000650000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametttrgggrrrt.exe" vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4128791399.0000000000D2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002921000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefirefox.exe0 vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq,\\StringFileInfo\\000004B0\\OriginalFilename vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq,\\StringFileInfo\\040904B0\\OriginalFilename vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXE.MUID vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXED vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq,\\StringFileInfo\\080904B0\\OriginalFilename vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4129533610.0000000002D14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsedge.exe> vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exeBinary or memory string: OriginalFilenametttrgggrrrt.exe" vs VIkn1bnYkP.exe
                    Source: VIkn1bnYkP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: VIkn1bnYkP.exe, type: SAMPLEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: 0.0.VIkn1bnYkP.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/5@0/1
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeMutant created: \Sessions\1\BaseNamedObjects\5c8947d1385c4e608aa7a0853c65418d
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2586.tmpJump to behavior
                    Source: VIkn1bnYkP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: VIkn1bnYkP.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: VIkn1bnYkP.exeVirustotal: Detection: 76%
                    Source: VIkn1bnYkP.exeReversingLabs: Detection: 70%
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: VIkn1bnYkP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06B0C29A push es; retf 0_2_06B0C2FC
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA0B81 push esp; ret 0_2_06BA0B89
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_06BA0881 push dword ptr [ebp+eax-18h]; ret 0_2_06BA0886
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeCode function: 0_2_07302F11 push A406CEBAh; retf 0_2_07302F1D
                    Source: VIkn1bnYkP.exeStatic PE information: section name: .text entropy: 6.939591378361454

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49733
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49734
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49735
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49736
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49737
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49740
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49741
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49743
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49744
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49745
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49746
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49747
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49748
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49750
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49751
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49754
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49757
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49758
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49760
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49761
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49762
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49763
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49764
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49765
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49767
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49768
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49769
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49770
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49771
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49772
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49773
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49774
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49775
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49776
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49777
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49778
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49779
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49780
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49781
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49782
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49783
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49784
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49785
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49786
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49787
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49788
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49789
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49790
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49791
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49792
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49793
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49794
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49795
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49796
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49797
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49798
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49799
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49800
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49801
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49802
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49805
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49806
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49812
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49818
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49824
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49830
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49836
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49840
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49848
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49854
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49860
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49866
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49872
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49878
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49884
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49890
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49896
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49902
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49908
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49914
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49920
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49927
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49933
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49939
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49945
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49951
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49957
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49963 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49963
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49969 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49969
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49975
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49982
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49988
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49994
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50007
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50016
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50022
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50028
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50034
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50040
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50044
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50050 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50050
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50056
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50062
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50068
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50074
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50078
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50083
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50089
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50095
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50101 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50101
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50107
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50113
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50119
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50124 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50124
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50125
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50126
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50127
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50128
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50129
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50130
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50131
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50132
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50133
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50134
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50135
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50136
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50137 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50137
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50138
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50139 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50139
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50140 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50140
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50141
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50142 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50142
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50143 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50143
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50144 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50144
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50145 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50145
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50146 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50146
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50147 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50147
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50148 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50148
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50149 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50149
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50150 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50150
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50151 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50151
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50152 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50152
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50153
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50154 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50154
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50155 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50155
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50156
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50157 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50157
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50158 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50158
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50159 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50159
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50160
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50161
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50162 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50162
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50163 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50163
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50164 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50164
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50165
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50166 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50166
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50167 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50167
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50168 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50168
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50169 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50169
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50170 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50170
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50171 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50171
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50172 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50172
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50173
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50174
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50175 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50175
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50176 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50176
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50177
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50178 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50178
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50179 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50179
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50180 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50180
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50181 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50181
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50182 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50182
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50183
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50185
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50186 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50186
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50187
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50188 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50188
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50189 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50189
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50190 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50190
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50191 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50191
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50192 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50192
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50193
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50194 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50194
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50195 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50195
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50196 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50196
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50197
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50198 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50198
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50199 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50199
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50200 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50200
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50201 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50201
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50202 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50202
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50203 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50203
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50204 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50204
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50205
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50206 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50206
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50207 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50207
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50208 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50208
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50209 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50209
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50210 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50210
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50211
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50212 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50212
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50213
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50214
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50215
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50216 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50216
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50218 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50218
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50219
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50220 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50220
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50221 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50221
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50222 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50222
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50223
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50224 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50224
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50225
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50226 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50226
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50227 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50227
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50228 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50228
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50229 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50229
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50230
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50231 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50231
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50232
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50233
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50234
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50235
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50236 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50236
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50237 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50237
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50238 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50238
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50239 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50239
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50240
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50241
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50242
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50243 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50243
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50244 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50244
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50245 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50245
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50246 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50246
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50247 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50247
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50248 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50248
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50249 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50249
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50250 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50250
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50251 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50251
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50252 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50252
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50253 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50253
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50254 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50254
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50255 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50255
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50256 -> 9000
                    Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50256
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeMemory allocated: FE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeMemory allocated: 4920000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWindow / User API: threadDelayed 6554Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWindow / User API: threadDelayed 3058Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -59891s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -39293s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -59781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -59672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -59563s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -34521s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -59453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4048Thread sleep time: -59344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -52651s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -33908s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -52754s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -53512s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -49581s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -42983s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -36655s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -43135s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -40122s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -33608s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4488Thread sleep time: -540000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -30175s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -55013s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -52106s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -39730s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -36647s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 1740Thread sleep time: -1800000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -35091s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -44865s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -45495s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -37025s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -42611s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -43500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -32901s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -57995s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -45118s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -53908s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exe TID: 4192Thread sleep time: -46241s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 60000Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 59891Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 39293Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 59781Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 59672Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 59563Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 34521Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 59453Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 59344Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 52651Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 33908Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 52754Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 53512Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 49581Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 42983Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 36655Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 43135Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 40122Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 33608Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 60000Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 30175Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 55013Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 52106Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 39730Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 36647Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 35091Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 44865Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 45495Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 37025Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 42611Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 43500Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 32901Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 57995Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 45118Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 53908Jump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeThread delayed: delay time: 46241Jump to behavior
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4128791399.0000000000DC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Users\user\Desktop\VIkn1bnYkP.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: VIkn1bnYkP.exe, 00000000.00000002.4134398632.0000000005F39000.00000004.00000020.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4134398632.0000000005F03000.00000004.00000020.00020000.00000000.sdmp, VIkn1bnYkP.exe, 00000000.00000002.4128791399.0000000000E1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: VIkn1bnYkP.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.VIkn1bnYkP.exe.590000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1689534765.0000000000592000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VIkn1bnYkP.exe PID: 5932, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: VIkn1bnYkP.exe PID: 5932, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\VIkn1bnYkP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: Yara matchFile source: VIkn1bnYkP.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.VIkn1bnYkP.exe.590000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1689534765.0000000000592000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VIkn1bnYkP.exe PID: 5932, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: VIkn1bnYkP.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.VIkn1bnYkP.exe.590000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1689534765.0000000000592000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VIkn1bnYkP.exe PID: 5932, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: VIkn1bnYkP.exe PID: 5932, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    231
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    11
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                    Virtualization/Sandbox Evasion
                    Security Account Manager241
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                    Obfuscated Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Software Packing
                    LSA Secrets113
                    System Information Discovery
                    SSHKeylogging1
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.