Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GELEPLLV.msi

Overview

General Information

Sample name:GELEPLLV.msi
Analysis ID:1629534
MD5:1044cd6af25675680ec37008fa8469f9
SHA1:9517f01fd4933aec4a0e8b885653cf7cf36bdd2e
SHA256:345f2791ba1e227504d337c775992e294dc889fc9930bfcf7a213b5748ecf802
Tags:msiuser-1ZRR4H
Infos:

Detection

RedLine, SectopRAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
Yara detected SectopRAT
Connects to many ports of the same IP (likely port scanning)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Is looking for software installed on the system
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • msiexec.exe (PID: 7564 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\GELEPLLV.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7596 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7640 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 721F7157EC60ED4BDE0DFCD92E791EEC C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • ISBEW64.exe (PID: 7692 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E83174FE-C665-465A-A362-97A8557AEF45} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7724 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C7269B72-A4F4-4A43-AD82-18F3A8EDEB2E} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7756 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E0BC4BB7-F4AD-4186-90AB-E1483A5D8CF4} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7804 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F96A5C8A-D5FB-4FF8-A586-B8E8188D2794} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7836 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{02392C44-6D1B-487E-A493-44C3EC06AA27} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7876 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C246B97D-1770-433A-A54B-78C6BB3E25A3} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7920 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9A403955-82B3-4C45-BC39-9961952DDF3C} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7952 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{28E1C0CE-7C15-4622-AE11-9EABAAF98FF8} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 7984 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{36385D1D-E9F1-44EB-B7AF-C3D9BCFE6308} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 8016 cmdline: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{129B1CD9-B0F3-479E-B4D1-596CC8169910} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • SplashWin.exe (PID: 8052 cmdline: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exe MD5: 4D20B83562EEC3660E45027AD56FB444)
        • SplashWin.exe (PID: 8076 cmdline: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exe MD5: 4D20B83562EEC3660E45027AD56FB444)
          • cmd.exe (PID: 8116 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 8124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • MSBuild.exe (PID: 7728 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • SplashWin.exe (PID: 7960 cmdline: "C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exe" MD5: 4D20B83562EEC3660E45027AD56FB444)
    • cmd.exe (PID: 7952 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • MSBuild.exe (PID: 2720 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\igbbbmfixJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    C:\Users\user\AppData\Local\Temp\igbbbmfixJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      C:\Users\user\AppData\Local\Temp\igbbbmfixMALWARE_Win_Arechclient2Detects Arechclient2 RATditekSHen
      • 0xbe9c7:$s14: keybd_event
      • 0xc5bb3:$v1_1: grabber@
      • 0xbf51f:$v1_2: <BrowserProfile>k__
      • 0xbff9e:$v1_3: <SystemHardwares>k__
      • 0xc005d:$v1_5: <ScannedWallets>k__
      • 0xc00ed:$v1_6: <DicrFiles>k__
      • 0xc00c9:$v1_7: <MessageClientFiles>k__
      • 0xc0493:$v1_8: <ScanBrowsers>k__BackingField
      • 0xc04e5:$v1_8: <ScanWallets>k__BackingField
      • 0xc0502:$v1_8: <ScanScreen>k__BackingField
      • 0xc053c:$v1_8: <ScanVPN>k__BackingField
      • 0xb17ea:$v1_9: displayName[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}Local Extension Settingshost
      • 0xb10f6:$v1_10: \sitemanager.xml MB or SELECT * FROM Cookiesconfig
      C:\Users\user\AppData\Local\Temp\hxyamwavxtmtmJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        C:\Users\user\AppData\Local\Temp\hxyamwavxtmtmJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0000000F.00000002.2012956923.0000000005DF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0000000F.00000002.2012956923.0000000005DF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              00000019.00000002.2304532163.0000000004F80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000019.00000002.2304532163.0000000004F80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0000001C.00000002.2303821346.0000000000902000.00000002.00000001.01000000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 8 entries
                    SourceRuleDescriptionAuthorStrings
                    25.2.cmd.exe.4f800c8.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      25.2.cmd.exe.4f800c8.7.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                        25.2.cmd.exe.4f800c8.7.unpackMALWARE_Win_Arechclient2Detects Arechclient2 RATditekSHen
                        • 0xbcbc7:$s14: keybd_event
                        • 0xc3db3:$v1_1: grabber@
                        • 0xbd71f:$v1_2: <BrowserProfile>k__
                        • 0xbe19e:$v1_3: <SystemHardwares>k__
                        • 0xbe25d:$v1_5: <ScannedWallets>k__
                        • 0xbe2ed:$v1_6: <DicrFiles>k__
                        • 0xbe2c9:$v1_7: <MessageClientFiles>k__
                        • 0xbe693:$v1_8: <ScanBrowsers>k__BackingField
                        • 0xbe6e5:$v1_8: <ScanWallets>k__BackingField
                        • 0xbe702:$v1_8: <ScanScreen>k__BackingField
                        • 0xbe73c:$v1_8: <ScanVPN>k__BackingField
                        • 0xaf9ea:$v1_9: displayName[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}Local Extension Settingshost
                        • 0xaf2f6:$v1_10: \sitemanager.xml MB or SELECT * FROM Cookiesconfig
                        15.2.cmd.exe.5df00c8.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                          15.2.cmd.exe.5df00c8.7.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                            Click to see the 10 entries
                            No Sigma rule has matched
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2025-03-04T21:00:53.125862+010020522481A Network Trojan was detected192.168.2.44973892.255.85.239000TCP
                            2025-03-04T21:00:53.992956+010020522481A Network Trojan was detected192.168.2.44973992.255.85.239000TCP
                            2025-03-04T21:00:54.818562+010020522481A Network Trojan was detected192.168.2.44974092.255.85.239000TCP
                            2025-03-04T21:00:55.685988+010020522481A Network Trojan was detected192.168.2.44974192.255.85.239000TCP
                            2025-03-04T21:00:56.531220+010020522481A Network Trojan was detected192.168.2.44974292.255.85.239000TCP
                            2025-03-04T21:00:57.364440+010020522481A Network Trojan was detected192.168.2.44974392.255.85.239000TCP
                            2025-03-04T21:00:58.217347+010020522481A Network Trojan was detected192.168.2.44974492.255.85.239000TCP
                            2025-03-04T21:00:59.052545+010020522481A Network Trojan was detected192.168.2.44974592.255.85.239000TCP
                            2025-03-04T21:00:59.899458+010020522481A Network Trojan was detected192.168.2.44974692.255.85.239000TCP
                            2025-03-04T21:01:00.768461+010020522481A Network Trojan was detected192.168.2.44974792.255.85.239000TCP
                            2025-03-04T21:01:01.597360+010020522481A Network Trojan was detected192.168.2.44974892.255.85.239000TCP
                            2025-03-04T21:01:02.481607+010020522481A Network Trojan was detected192.168.2.44974992.255.85.239000TCP
                            2025-03-04T21:01:03.301579+010020522481A Network Trojan was detected192.168.2.44975092.255.85.239000TCP
                            2025-03-04T21:01:04.147483+010020522481A Network Trojan was detected192.168.2.44975192.255.85.239000TCP
                            2025-03-04T21:01:05.061301+010020522481A Network Trojan was detected192.168.2.44975292.255.85.239000TCP
                            2025-03-04T21:01:05.910054+010020522481A Network Trojan was detected192.168.2.44975392.255.85.239000TCP
                            2025-03-04T21:01:06.746819+010020522481A Network Trojan was detected192.168.2.44975592.255.85.239000TCP
                            2025-03-04T21:01:07.600463+010020522481A Network Trojan was detected192.168.2.44975692.255.85.239000TCP
                            2025-03-04T21:01:08.448578+010020522481A Network Trojan was detected192.168.2.44975792.255.85.239000TCP
                            2025-03-04T21:01:09.305983+010020522481A Network Trojan was detected192.168.2.44975892.255.85.239000TCP
                            2025-03-04T21:01:10.340958+010020522481A Network Trojan was detected192.168.2.44975992.255.85.239000TCP
                            2025-03-04T21:01:11.203721+010020522481A Network Trojan was detected192.168.2.44976292.255.85.239000TCP
                            2025-03-04T21:01:12.144994+010020522481A Network Trojan was detected192.168.2.44976492.255.85.239000TCP
                            2025-03-04T21:01:13.864713+010020522481A Network Trojan was detected192.168.2.44976692.255.85.239000TCP
                            2025-03-04T21:01:14.791326+010020522481A Network Trojan was detected192.168.2.44976792.255.85.239000TCP
                            2025-03-04T21:01:15.635987+010020522481A Network Trojan was detected192.168.2.44976992.255.85.239000TCP
                            2025-03-04T21:01:16.486959+010020522481A Network Trojan was detected192.168.2.44977592.255.85.239000TCP
                            2025-03-04T21:01:17.313331+010020522481A Network Trojan was detected192.168.2.44978192.255.85.239000TCP
                            2025-03-04T21:01:18.151827+010020522481A Network Trojan was detected192.168.2.44978792.255.85.239000TCP
                            2025-03-04T21:01:18.986712+010020522481A Network Trojan was detected192.168.2.44979392.255.85.239000TCP
                            2025-03-04T21:01:19.808491+010020522481A Network Trojan was detected192.168.2.44980092.255.85.239000TCP
                            2025-03-04T21:01:20.633362+010020522481A Network Trojan was detected192.168.2.44980692.255.85.239000TCP
                            2025-03-04T21:01:21.483263+010020522481A Network Trojan was detected192.168.2.44981892.255.85.239000TCP
                            2025-03-04T21:01:22.392623+010020522481A Network Trojan was detected192.168.2.44982592.255.85.239000TCP
                            2025-03-04T21:01:23.359746+010020522481A Network Trojan was detected192.168.2.44983192.255.85.239000TCP
                            2025-03-04T21:01:24.183641+010020522481A Network Trojan was detected192.168.2.44984392.255.85.239000TCP
                            2025-03-04T21:01:25.019007+010020522481A Network Trojan was detected192.168.2.44984992.255.85.239000TCP
                            2025-03-04T21:01:25.843355+010020522481A Network Trojan was detected192.168.2.44985692.255.85.239000TCP
                            2025-03-04T21:01:26.678545+010020522481A Network Trojan was detected192.168.2.44986492.255.85.239000TCP
                            2025-03-04T21:01:27.508822+010020522481A Network Trojan was detected192.168.2.44987092.255.85.239000TCP
                            2025-03-04T21:01:28.373364+010020522481A Network Trojan was detected192.168.2.44987992.255.85.239000TCP
                            2025-03-04T21:01:29.269973+010020522481A Network Trojan was detected192.168.2.44988792.255.85.239000TCP
                            2025-03-04T21:01:30.091047+010020522481A Network Trojan was detected192.168.2.44989492.255.85.239000TCP
                            2025-03-04T21:01:30.908381+010020522481A Network Trojan was detected192.168.2.44990092.255.85.239000TCP
                            2025-03-04T21:01:31.755094+010020522481A Network Trojan was detected192.168.2.44990792.255.85.239000TCP
                            2025-03-04T21:01:32.569458+010020522481A Network Trojan was detected192.168.2.44991792.255.85.239000TCP
                            2025-03-04T21:01:33.399550+010020522481A Network Trojan was detected192.168.2.44992492.255.85.239000TCP
                            2025-03-04T21:01:34.228163+010020522481A Network Trojan was detected192.168.2.44993092.255.85.239000TCP
                            2025-03-04T21:01:35.045705+010020522481A Network Trojan was detected192.168.2.44993692.255.85.239000TCP
                            2025-03-04T21:01:35.893556+010020522481A Network Trojan was detected192.168.2.44994192.255.85.239000TCP
                            2025-03-04T21:01:36.769227+010020522481A Network Trojan was detected192.168.2.44994592.255.85.239000TCP
                            2025-03-04T21:01:37.591532+010020522481A Network Trojan was detected192.168.2.44995092.255.85.239000TCP
                            2025-03-04T21:01:38.454815+010020522481A Network Trojan was detected192.168.2.44995692.255.85.239000TCP
                            2025-03-04T21:01:39.331700+010020522481A Network Trojan was detected192.168.2.44996192.255.85.239000TCP
                            2025-03-04T21:01:40.166096+010020522481A Network Trojan was detected192.168.2.44996892.255.85.239000TCP
                            2025-03-04T21:01:41.055824+010020522481A Network Trojan was detected192.168.2.44997492.255.85.239000TCP
                            2025-03-04T21:01:41.865890+010020522481A Network Trojan was detected192.168.2.44997992.255.85.239000TCP
                            2025-03-04T21:01:42.698684+010020522481A Network Trojan was detected192.168.2.44998692.255.85.239000TCP
                            2025-03-04T21:01:43.525270+010020522481A Network Trojan was detected192.168.2.44999292.255.85.239000TCP
                            2025-03-04T21:01:44.364609+010020522481A Network Trojan was detected192.168.2.44999892.255.85.239000TCP
                            2025-03-04T21:01:45.195987+010020522481A Network Trojan was detected192.168.2.45000492.255.85.239000TCP
                            2025-03-04T21:01:46.006298+010020522481A Network Trojan was detected192.168.2.45001192.255.85.239000TCP
                            2025-03-04T21:01:46.864899+010020522481A Network Trojan was detected192.168.2.45001792.255.85.239000TCP
                            2025-03-04T21:01:47.680422+010020522481A Network Trojan was detected192.168.2.45002492.255.85.239000TCP
                            2025-03-04T21:01:48.548834+010020522481A Network Trojan was detected192.168.2.45002892.255.85.239000TCP
                            2025-03-04T21:01:49.405104+010020522481A Network Trojan was detected192.168.2.45003492.255.85.239000TCP
                            2025-03-04T21:01:50.270021+010020522481A Network Trojan was detected192.168.2.45004092.255.85.239000TCP
                            2025-03-04T21:01:51.113876+010020522481A Network Trojan was detected192.168.2.45004592.255.85.239000TCP
                            2025-03-04T21:01:51.995822+010020522481A Network Trojan was detected192.168.2.45005192.255.85.239000TCP
                            2025-03-04T21:01:52.835939+010020522481A Network Trojan was detected192.168.2.45005792.255.85.239000TCP
                            2025-03-04T21:01:53.705533+010020522481A Network Trojan was detected192.168.2.45006392.255.85.239000TCP
                            2025-03-04T21:01:54.527304+010020522481A Network Trojan was detected192.168.2.45006892.255.85.239000TCP
                            2025-03-04T21:01:55.372954+010020522481A Network Trojan was detected192.168.2.45007492.255.85.239000TCP
                            2025-03-04T21:01:56.234546+010020522481A Network Trojan was detected192.168.2.45008092.255.85.239000TCP
                            2025-03-04T21:01:57.084907+010020522481A Network Trojan was detected192.168.2.45008692.255.85.239000TCP
                            2025-03-04T21:01:57.905893+010020522481A Network Trojan was detected192.168.2.45009692.255.85.239000TCP
                            2025-03-04T21:01:58.812127+010020522481A Network Trojan was detected192.168.2.45010392.255.85.239000TCP
                            2025-03-04T21:01:59.669318+010020522481A Network Trojan was detected192.168.2.45011192.255.85.239000TCP
                            2025-03-04T21:02:00.494517+010020522481A Network Trojan was detected192.168.2.45011692.255.85.239000TCP
                            2025-03-04T21:02:01.303956+010020522481A Network Trojan was detected192.168.2.45011792.255.85.239000TCP
                            2025-03-04T21:02:02.136998+010020522481A Network Trojan was detected192.168.2.45011892.255.85.239000TCP
                            2025-03-04T21:02:02.974434+010020522481A Network Trojan was detected192.168.2.45011992.255.85.239000TCP
                            2025-03-04T21:02:03.809105+010020522481A Network Trojan was detected192.168.2.45012092.255.85.239000TCP
                            2025-03-04T21:02:04.695495+010020522481A Network Trojan was detected192.168.2.45012292.255.85.239000TCP
                            2025-03-04T21:02:05.579963+010020522481A Network Trojan was detected192.168.2.45012392.255.85.239000TCP
                            2025-03-04T21:02:06.420333+010020522481A Network Trojan was detected192.168.2.45012592.255.85.239000TCP
                            2025-03-04T21:02:07.281534+010020522481A Network Trojan was detected192.168.2.45012692.255.85.239000TCP
                            2025-03-04T21:02:08.135514+010020522481A Network Trojan was detected192.168.2.45012792.255.85.239000TCP
                            2025-03-04T21:02:08.959539+010020522481A Network Trojan was detected192.168.2.45013292.255.85.239000TCP
                            2025-03-04T21:02:09.772125+010020522481A Network Trojan was detected192.168.2.45013392.255.85.239000TCP
                            2025-03-04T21:02:10.628530+010020522481A Network Trojan was detected192.168.2.45013692.255.85.239000TCP
                            2025-03-04T21:02:11.479646+010020522481A Network Trojan was detected192.168.2.45013892.255.85.239000TCP
                            2025-03-04T21:02:12.458611+010020522481A Network Trojan was detected192.168.2.45014192.255.85.239000TCP
                            2025-03-04T21:02:13.303557+010020522481A Network Trojan was detected192.168.2.45014492.255.85.239000TCP
                            2025-03-04T21:02:14.129687+010020522481A Network Trojan was detected192.168.2.45014592.255.85.239000TCP
                            2025-03-04T21:02:14.967991+010020522481A Network Trojan was detected192.168.2.45014692.255.85.239000TCP
                            2025-03-04T21:02:15.787862+010020522481A Network Trojan was detected192.168.2.45014792.255.85.239000TCP
                            2025-03-04T21:02:16.614641+010020522481A Network Trojan was detected192.168.2.45014892.255.85.239000TCP
                            2025-03-04T21:02:17.449428+010020522481A Network Trojan was detected192.168.2.45014992.255.85.239000TCP
                            2025-03-04T21:02:18.279892+010020522481A Network Trojan was detected192.168.2.45015092.255.85.239000TCP
                            2025-03-04T21:02:19.100694+010020522481A Network Trojan was detected192.168.2.45015292.255.85.239000TCP
                            2025-03-04T21:02:19.946065+010020522481A Network Trojan was detected192.168.2.45015392.255.85.239000TCP
                            2025-03-04T21:02:20.928682+010020522481A Network Trojan was detected192.168.2.45015492.255.85.239000TCP
                            2025-03-04T21:02:21.803026+010020522481A Network Trojan was detected192.168.2.45015692.255.85.239000TCP
                            2025-03-04T21:02:22.623599+010020522481A Network Trojan was detected192.168.2.45015792.255.85.239000TCP
                            2025-03-04T21:02:23.507620+010020522481A Network Trojan was detected192.168.2.45015892.255.85.239000TCP
                            2025-03-04T21:02:24.329036+010020522481A Network Trojan was detected192.168.2.45015992.255.85.239000TCP
                            2025-03-04T21:02:25.207802+010020522481A Network Trojan was detected192.168.2.45016092.255.85.239000TCP
                            2025-03-04T21:02:26.062464+010020522481A Network Trojan was detected192.168.2.45016192.255.85.239000TCP
                            2025-03-04T21:02:26.899754+010020522481A Network Trojan was detected192.168.2.45016292.255.85.239000TCP
                            2025-03-04T21:02:27.736411+010020522481A Network Trojan was detected192.168.2.45016392.255.85.239000TCP
                            2025-03-04T21:02:28.659434+010020522481A Network Trojan was detected192.168.2.45016492.255.85.239000TCP
                            2025-03-04T21:02:29.500471+010020522481A Network Trojan was detected192.168.2.45016592.255.85.239000TCP
                            2025-03-04T21:02:30.345077+010020522481A Network Trojan was detected192.168.2.45016692.255.85.239000TCP
                            2025-03-04T21:02:31.169714+010020522481A Network Trojan was detected192.168.2.45016792.255.85.239000TCP
                            2025-03-04T21:02:32.062033+010020522481A Network Trojan was detected192.168.2.45016892.255.85.239000TCP
                            2025-03-04T21:02:32.900724+010020522481A Network Trojan was detected192.168.2.45016992.255.85.239000TCP
                            2025-03-04T21:02:33.716349+010020522481A Network Trojan was detected192.168.2.45017092.255.85.239000TCP
                            2025-03-04T21:02:34.570364+010020522481A Network Trojan was detected192.168.2.45017192.255.85.239000TCP
                            2025-03-04T21:02:35.475026+010020522481A Network Trojan was detected192.168.2.45017292.255.85.239000TCP
                            2025-03-04T21:02:36.358069+010020522481A Network Trojan was detected192.168.2.45017392.255.85.239000TCP
                            2025-03-04T21:02:37.207579+010020522481A Network Trojan was detected192.168.2.45017492.255.85.239000TCP
                            2025-03-04T21:02:38.054914+010020522481A Network Trojan was detected192.168.2.45017592.255.85.239000TCP
                            2025-03-04T21:02:38.908948+010020522481A Network Trojan was detected192.168.2.45017692.255.85.239000TCP
                            2025-03-04T21:02:39.812270+010020522481A Network Trojan was detected192.168.2.45017792.255.85.239000TCP
                            2025-03-04T21:02:40.630142+010020522481A Network Trojan was detected192.168.2.45017992.255.85.239000TCP
                            2025-03-04T21:02:41.455623+010020522481A Network Trojan was detected192.168.2.45018092.255.85.239000TCP
                            2025-03-04T21:02:42.311385+010020522481A Network Trojan was detected192.168.2.45018192.255.85.239000TCP
                            2025-03-04T21:02:43.179215+010020522481A Network Trojan was detected192.168.2.45018292.255.85.239000TCP
                            2025-03-04T21:02:44.046659+010020522481A Network Trojan was detected192.168.2.45018392.255.85.239000TCP
                            2025-03-04T21:02:44.897288+010020522481A Network Trojan was detected192.168.2.45018492.255.85.239000TCP
                            2025-03-04T21:02:45.822529+010020522481A Network Trojan was detected192.168.2.45018592.255.85.239000TCP
                            2025-03-04T21:02:46.932417+010020522481A Network Trojan was detected192.168.2.45018692.255.85.239000TCP
                            2025-03-04T21:02:47.774908+010020522481A Network Trojan was detected192.168.2.45018792.255.85.239000TCP
                            2025-03-04T21:02:48.592667+010020522481A Network Trojan was detected192.168.2.45018892.255.85.239000TCP
                            2025-03-04T21:02:49.550099+010020522481A Network Trojan was detected192.168.2.45018992.255.85.239000TCP
                            2025-03-04T21:02:50.675290+010020522481A Network Trojan was detected192.168.2.45019092.255.85.239000TCP
                            2025-03-04T21:02:51.542170+010020522481A Network Trojan was detected192.168.2.45019292.255.85.239000TCP
                            2025-03-04T21:02:52.451487+010020522481A Network Trojan was detected192.168.2.45019392.255.85.239000TCP
                            2025-03-04T21:02:53.446969+010020522481A Network Trojan was detected192.168.2.45019492.255.85.239000TCP
                            2025-03-04T21:02:54.266556+010020522481A Network Trojan was detected192.168.2.45019792.255.85.239000TCP
                            2025-03-04T21:02:55.095852+010020522481A Network Trojan was detected192.168.2.45019892.255.85.239000TCP
                            2025-03-04T21:02:55.960888+010020522481A Network Trojan was detected192.168.2.45020092.255.85.239000TCP
                            2025-03-04T21:02:56.827925+010020522481A Network Trojan was detected192.168.2.45020192.255.85.239000TCP
                            2025-03-04T21:02:57.661662+010020522481A Network Trojan was detected192.168.2.45020292.255.85.239000TCP
                            2025-03-04T21:02:58.499341+010020522481A Network Trojan was detected192.168.2.45020392.255.85.239000TCP
                            2025-03-04T21:02:59.367401+010020522481A Network Trojan was detected192.168.2.45020492.255.85.239000TCP
                            2025-03-04T21:03:00.178904+010020522481A Network Trojan was detected192.168.2.45020592.255.85.239000TCP
                            2025-03-04T21:03:01.019233+010020522481A Network Trojan was detected192.168.2.45020692.255.85.239000TCP
                            2025-03-04T21:03:01.885143+010020522481A Network Trojan was detected192.168.2.45020792.255.85.239000TCP
                            2025-03-04T21:03:02.709574+010020522481A Network Trojan was detected192.168.2.45020892.255.85.239000TCP
                            2025-03-04T21:03:03.524943+010020522481A Network Trojan was detected192.168.2.45021092.255.85.239000TCP
                            2025-03-04T21:03:04.390359+010020522481A Network Trojan was detected192.168.2.45021192.255.85.239000TCP
                            2025-03-04T21:03:05.284387+010020522481A Network Trojan was detected192.168.2.45021292.255.85.239000TCP
                            2025-03-04T21:03:06.145050+010020522481A Network Trojan was detected192.168.2.45021392.255.85.239000TCP
                            2025-03-04T21:03:07.093308+010020522481A Network Trojan was detected192.168.2.45021492.255.85.239000TCP
                            2025-03-04T21:03:07.944787+010020522481A Network Trojan was detected192.168.2.45021592.255.85.239000TCP
                            2025-03-04T21:03:08.994494+010020522481A Network Trojan was detected192.168.2.45021792.255.85.239000TCP
                            2025-03-04T21:03:09.811603+010020522481A Network Trojan was detected192.168.2.45021992.255.85.239000TCP
                            2025-03-04T21:03:10.697639+010020522481A Network Trojan was detected192.168.2.45022192.255.85.239000TCP
                            2025-03-04T21:03:11.515497+010020522481A Network Trojan was detected192.168.2.45022292.255.85.239000TCP
                            2025-03-04T21:03:12.335430+010020522481A Network Trojan was detected192.168.2.45022392.255.85.239000TCP
                            2025-03-04T21:03:13.272778+010020522481A Network Trojan was detected192.168.2.45022492.255.85.239000TCP
                            2025-03-04T21:03:14.100728+010020522481A Network Trojan was detected192.168.2.45022592.255.85.239000TCP
                            2025-03-04T21:03:14.946357+010020522481A Network Trojan was detected192.168.2.45022692.255.85.239000TCP
                            2025-03-04T21:03:15.767687+010020522481A Network Trojan was detected192.168.2.45022792.255.85.239000TCP
                            2025-03-04T21:03:16.622891+010020522481A Network Trojan was detected192.168.2.45022892.255.85.239000TCP
                            2025-03-04T21:03:17.648588+010020522481A Network Trojan was detected192.168.2.45022992.255.85.239000TCP
                            2025-03-04T21:03:18.520555+010020522481A Network Trojan was detected192.168.2.45023092.255.85.239000TCP
                            2025-03-04T21:03:19.348572+010020522481A Network Trojan was detected192.168.2.45023192.255.85.239000TCP
                            2025-03-04T21:03:20.193767+010020522481A Network Trojan was detected192.168.2.45023292.255.85.239000TCP
                            2025-03-04T21:03:21.049770+010020522481A Network Trojan was detected192.168.2.45023392.255.85.239000TCP
                            2025-03-04T21:03:21.885694+010020522481A Network Trojan was detected192.168.2.45023492.255.85.239000TCP
                            2025-03-04T21:03:22.824144+010020522481A Network Trojan was detected192.168.2.45023592.255.85.239000TCP
                            2025-03-04T21:03:23.696251+010020522481A Network Trojan was detected192.168.2.45023692.255.85.239000TCP
                            2025-03-04T21:03:24.556032+010020522481A Network Trojan was detected192.168.2.45023792.255.85.239000TCP
                            2025-03-04T21:03:25.394956+010020522481A Network Trojan was detected192.168.2.45023992.255.85.239000TCP
                            2025-03-04T21:03:26.316474+010020522481A Network Trojan was detected192.168.2.45024092.255.85.239000TCP
                            2025-03-04T21:03:27.155640+010020522481A Network Trojan was detected192.168.2.45024192.255.85.239000TCP
                            2025-03-04T21:03:28.052179+010020522481A Network Trojan was detected192.168.2.45024292.255.85.239000TCP
                            2025-03-04T21:03:29.063905+010020522481A Network Trojan was detected192.168.2.45024392.255.85.239000TCP
                            2025-03-04T21:03:29.916329+010020522481A Network Trojan was detected192.168.2.45024492.255.85.239000TCP
                            2025-03-04T21:03:30.768812+010020522481A Network Trojan was detected192.168.2.45024592.255.85.239000TCP
                            2025-03-04T21:03:31.609283+010020522481A Network Trojan was detected192.168.2.45024792.255.85.239000TCP
                            2025-03-04T21:03:32.456364+010020522481A Network Trojan was detected192.168.2.45024892.255.85.239000TCP
                            2025-03-04T21:03:33.309679+010020522481A Network Trojan was detected192.168.2.45024992.255.85.239000TCP
                            2025-03-04T21:03:34.119233+010020522481A Network Trojan was detected192.168.2.45025092.255.85.239000TCP
                            2025-03-04T21:03:34.958479+010020522481A Network Trojan was detected192.168.2.45025192.255.85.239000TCP
                            2025-03-04T21:03:35.819190+010020522481A Network Trojan was detected192.168.2.45025292.255.85.239000TCP
                            2025-03-04T21:03:36.659511+010020522481A Network Trojan was detected192.168.2.45025392.255.85.239000TCP
                            2025-03-04T21:03:37.477178+010020522481A Network Trojan was detected192.168.2.45025492.255.85.239000TCP
                            2025-03-04T21:03:38.289317+010020522481A Network Trojan was detected192.168.2.45025592.255.85.239000TCP
                            2025-03-04T21:03:39.269409+010020522481A Network Trojan was detected192.168.2.45025692.255.85.239000TCP
                            2025-03-04T21:03:40.126001+010020522481A Network Trojan was detected192.168.2.45025792.255.85.239000TCP
                            2025-03-04T21:03:40.964072+010020522481A Network Trojan was detected192.168.2.45025892.255.85.239000TCP
                            2025-03-04T21:03:41.800937+010020522481A Network Trojan was detected192.168.2.45025992.255.85.239000TCP
                            2025-03-04T21:03:42.634917+010020522481A Network Trojan was detected192.168.2.45026092.255.85.239000TCP
                            2025-03-04T21:03:43.454821+010020522481A Network Trojan was detected192.168.2.45026192.255.85.239000TCP
                            2025-03-04T21:03:44.335691+010020522481A Network Trojan was detected192.168.2.45026292.255.85.239000TCP
                            2025-03-04T21:03:45.156152+010020522481A Network Trojan was detected192.168.2.45026392.255.85.239000TCP
                            2025-03-04T21:03:45.995560+010020522481A Network Trojan was detected192.168.2.45026492.255.85.239000TCP
                            2025-03-04T21:03:46.828438+010020522481A Network Trojan was detected192.168.2.45026592.255.85.239000TCP
                            2025-03-04T21:03:47.654581+010020522481A Network Trojan was detected192.168.2.45026692.255.85.239000TCP
                            2025-03-04T21:03:48.510336+010020522481A Network Trojan was detected192.168.2.45026792.255.85.239000TCP
                            2025-03-04T21:03:49.345708+010020522481A Network Trojan was detected192.168.2.45026892.255.85.239000TCP
                            2025-03-04T21:03:50.170870+010020522481A Network Trojan was detected192.168.2.45026992.255.85.239000TCP
                            2025-03-04T21:03:50.994376+010020522481A Network Trojan was detected192.168.2.45027092.255.85.239000TCP
                            2025-03-04T21:03:51.837309+010020522481A Network Trojan was detected192.168.2.45027292.255.85.239000TCP
                            2025-03-04T21:03:52.680509+010020522481A Network Trojan was detected192.168.2.45027392.255.85.239000TCP
                            2025-03-04T21:03:54.524349+010020522481A Network Trojan was detected192.168.2.45027492.255.85.239000TCP
                            2025-03-04T21:03:55.338706+010020522481A Network Trojan was detected192.168.2.45027592.255.85.239000TCP
                            2025-03-04T21:03:56.165636+010020522481A Network Trojan was detected192.168.2.45027692.255.85.239000TCP
                            2025-03-04T21:03:56.987462+010020522481A Network Trojan was detected192.168.2.45027792.255.85.239000TCP
                            2025-03-04T21:03:57.819595+010020522481A Network Trojan was detected192.168.2.45027892.255.85.239000TCP
                            2025-03-04T21:03:58.685486+010020522481A Network Trojan was detected192.168.2.45028192.255.85.239000TCP
                            2025-03-04T21:03:59.488131+010020522481A Network Trojan was detected192.168.2.45028292.255.85.239000TCP
                            2025-03-04T21:04:00.321970+010020522481A Network Trojan was detected192.168.2.45028392.255.85.239000TCP
                            2025-03-04T21:04:01.158547+010020522481A Network Trojan was detected192.168.2.45028492.255.85.239000TCP
                            2025-03-04T21:04:01.974720+010020522481A Network Trojan was detected192.168.2.45028592.255.85.239000TCP
                            2025-03-04T21:04:02.825038+010020522481A Network Trojan was detected192.168.2.45028692.255.85.239000TCP
                            2025-03-04T21:04:03.720011+010020522481A Network Trojan was detected192.168.2.45028792.255.85.239000TCP
                            2025-03-04T21:04:04.550082+010020522481A Network Trojan was detected192.168.2.45028892.255.85.239000TCP
                            2025-03-04T21:04:05.530364+010020522481A Network Trojan was detected192.168.2.45028992.255.85.239000TCP
                            2025-03-04T21:04:06.387721+010020522481A Network Trojan was detected192.168.2.45029092.255.85.239000TCP
                            2025-03-04T21:04:07.214525+010020522481A Network Trojan was detected192.168.2.45029192.255.85.239000TCP
                            2025-03-04T21:04:08.049148+010020522481A Network Trojan was detected192.168.2.45029292.255.85.239000TCP
                            2025-03-04T21:04:08.873595+010020522481A Network Trojan was detected192.168.2.45029392.255.85.239000TCP
                            2025-03-04T21:04:09.760338+010020522481A Network Trojan was detected192.168.2.45029492.255.85.239000TCP
                            2025-03-04T21:04:10.584408+010020522481A Network Trojan was detected192.168.2.45029592.255.85.239000TCP
                            2025-03-04T21:04:11.454330+010020522481A Network Trojan was detected192.168.2.45029692.255.85.239000TCP
                            2025-03-04T21:04:12.351066+010020522481A Network Trojan was detected192.168.2.45029792.255.85.239000TCP
                            2025-03-04T21:04:13.304164+010020522481A Network Trojan was detected192.168.2.45029892.255.85.239000TCP
                            2025-03-04T21:04:14.137102+010020522481A Network Trojan was detected192.168.2.45030092.255.85.239000TCP
                            2025-03-04T21:04:14.941254+010020522481A Network Trojan was detected192.168.2.45030192.255.85.239000TCP
                            2025-03-04T21:04:15.835900+010020522481A Network Trojan was detected192.168.2.45030292.255.85.239000TCP
                            2025-03-04T21:04:16.658422+010020522481A Network Trojan was detected192.168.2.45030492.255.85.239000TCP
                            2025-03-04T21:04:17.497036+010020522481A Network Trojan was detected192.168.2.45030592.255.85.239000TCP
                            2025-03-04T21:04:18.400075+010020522481A Network Trojan was detected192.168.2.45030692.255.85.239000TCP
                            2025-03-04T21:04:19.435474+010020522481A Network Trojan was detected192.168.2.45030792.255.85.239000TCP
                            2025-03-04T21:04:20.265010+010020522481A Network Trojan was detected192.168.2.45030892.255.85.239000TCP
                            2025-03-04T21:04:21.112212+010020522481A Network Trojan was detected192.168.2.45030992.255.85.239000TCP
                            2025-03-04T21:04:21.946242+010020522481A Network Trojan was detected192.168.2.45031092.255.85.239000TCP
                            2025-03-04T21:04:22.755995+010020522481A Network Trojan was detected192.168.2.45031192.255.85.239000TCP
                            2025-03-04T21:04:23.576760+010020522481A Network Trojan was detected192.168.2.45031392.255.85.239000TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2025-03-04T21:00:54.818562+010028033053Unknown Traffic192.168.2.44974092.255.85.239000TCP
                            2025-03-04T21:00:55.685988+010028033053Unknown Traffic192.168.2.44974192.255.85.239000TCP
                            2025-03-04T21:00:58.217347+010028033053Unknown Traffic192.168.2.44974492.255.85.239000TCP
                            2025-03-04T21:01:02.481607+010028033053Unknown Traffic192.168.2.44974992.255.85.239000TCP
                            2025-03-04T21:01:04.147483+010028033053Unknown Traffic192.168.2.44975192.255.85.239000TCP
                            2025-03-04T21:01:05.061301+010028033053Unknown Traffic192.168.2.44975292.255.85.239000TCP
                            2025-03-04T21:01:08.448578+010028033053Unknown Traffic192.168.2.44975792.255.85.239000TCP
                            2025-03-04T21:01:10.340958+010028033053Unknown Traffic192.168.2.44975992.255.85.239000TCP
                            2025-03-04T21:01:11.203721+010028033053Unknown Traffic192.168.2.44976292.255.85.239000TCP
                            2025-03-04T21:01:14.791326+010028033053Unknown Traffic192.168.2.44976792.255.85.239000TCP
                            2025-03-04T21:01:15.635987+010028033053Unknown Traffic192.168.2.44976992.255.85.239000TCP
                            2025-03-04T21:01:16.486959+010028033053Unknown Traffic192.168.2.44977592.255.85.239000TCP
                            2025-03-04T21:01:18.151827+010028033053Unknown Traffic192.168.2.44978792.255.85.239000TCP
                            2025-03-04T21:01:21.483263+010028033053Unknown Traffic192.168.2.44981892.255.85.239000TCP
                            2025-03-04T21:01:22.392623+010028033053Unknown Traffic192.168.2.44982592.255.85.239000TCP
                            2025-03-04T21:01:23.359746+010028033053Unknown Traffic192.168.2.44983192.255.85.239000TCP
                            2025-03-04T21:01:29.269973+010028033053Unknown Traffic192.168.2.44988792.255.85.239000TCP
                            2025-03-04T21:01:30.908381+010028033053Unknown Traffic192.168.2.44990092.255.85.239000TCP
                            2025-03-04T21:01:31.755094+010028033053Unknown Traffic192.168.2.44990792.255.85.239000TCP
                            2025-03-04T21:01:34.228163+010028033053Unknown Traffic192.168.2.44993092.255.85.239000TCP
                            2025-03-04T21:01:36.769227+010028033053Unknown Traffic192.168.2.44994592.255.85.239000TCP
                            2025-03-04T21:01:37.591532+010028033053Unknown Traffic192.168.2.44995092.255.85.239000TCP
                            2025-03-04T21:01:40.166096+010028033053Unknown Traffic192.168.2.44996892.255.85.239000TCP
                            2025-03-04T21:01:41.055824+010028033053Unknown Traffic192.168.2.44997492.255.85.239000TCP
                            2025-03-04T21:01:43.525270+010028033053Unknown Traffic192.168.2.44999292.255.85.239000TCP
                            2025-03-04T21:01:45.195987+010028033053Unknown Traffic192.168.2.45000492.255.85.239000TCP
                            2025-03-04T21:01:46.006298+010028033053Unknown Traffic192.168.2.45001192.255.85.239000TCP
                            2025-03-04T21:01:48.548834+010028033053Unknown Traffic192.168.2.45002892.255.85.239000TCP
                            2025-03-04T21:01:50.270021+010028033053Unknown Traffic192.168.2.45004092.255.85.239000TCP
                            2025-03-04T21:01:51.113876+010028033053Unknown Traffic192.168.2.45004592.255.85.239000TCP
                            2025-03-04T21:01:51.995822+010028033053Unknown Traffic192.168.2.45005192.255.85.239000TCP
                            2025-03-04T21:01:57.084907+010028033053Unknown Traffic192.168.2.45008692.255.85.239000TCP
                            2025-03-04T21:01:57.905893+010028033053Unknown Traffic192.168.2.45009692.255.85.239000TCP
                            2025-03-04T21:01:58.812127+010028033053Unknown Traffic192.168.2.45010392.255.85.239000TCP
                            2025-03-04T21:02:03.809105+010028033053Unknown Traffic192.168.2.45012092.255.85.239000TCP
                            2025-03-04T21:02:04.695495+010028033053Unknown Traffic192.168.2.45012292.255.85.239000TCP
                            2025-03-04T21:02:05.579963+010028033053Unknown Traffic192.168.2.45012392.255.85.239000TCP
                            2025-03-04T21:02:07.281534+010028033053Unknown Traffic192.168.2.45012692.255.85.239000TCP
                            2025-03-04T21:02:08.135514+010028033053Unknown Traffic192.168.2.45012792.255.85.239000TCP
                            2025-03-04T21:02:09.772125+010028033053Unknown Traffic192.168.2.45013392.255.85.239000TCP
                            2025-03-04T21:02:11.479646+010028033053Unknown Traffic192.168.2.45013892.255.85.239000TCP
                            2025-03-04T21:02:14.129687+010028033053Unknown Traffic192.168.2.45014592.255.85.239000TCP
                            2025-03-04T21:02:16.614641+010028033053Unknown Traffic192.168.2.45014892.255.85.239000TCP
                            2025-03-04T21:02:19.946065+010028033053Unknown Traffic192.168.2.45015392.255.85.239000TCP
                            2025-03-04T21:02:25.207802+010028033053Unknown Traffic192.168.2.45016092.255.85.239000TCP
                            2025-03-04T21:02:29.500471+010028033053Unknown Traffic192.168.2.45016592.255.85.239000TCP
                            2025-03-04T21:02:30.345077+010028033053Unknown Traffic192.168.2.45016692.255.85.239000TCP
                            2025-03-04T21:02:32.062033+010028033053Unknown Traffic192.168.2.45016892.255.85.239000TCP
                            2025-03-04T21:02:32.900724+010028033053Unknown Traffic192.168.2.45016992.255.85.239000TCP
                            2025-03-04T21:02:34.570364+010028033053Unknown Traffic192.168.2.45017192.255.85.239000TCP
                            2025-03-04T21:02:36.358069+010028033053Unknown Traffic192.168.2.45017392.255.85.239000TCP
                            2025-03-04T21:02:37.207579+010028033053Unknown Traffic192.168.2.45017492.255.85.239000TCP
                            2025-03-04T21:02:38.908948+010028033053Unknown Traffic192.168.2.45017692.255.85.239000TCP
                            2025-03-04T21:02:43.179215+010028033053Unknown Traffic192.168.2.45018292.255.85.239000TCP
                            2025-03-04T21:02:44.046659+010028033053Unknown Traffic192.168.2.45018392.255.85.239000TCP
                            2025-03-04T21:02:47.774908+010028033053Unknown Traffic192.168.2.45018792.255.85.239000TCP
                            2025-03-04T21:02:49.550099+010028033053Unknown Traffic192.168.2.45018992.255.85.239000TCP
                            2025-03-04T21:02:50.675290+010028033053Unknown Traffic192.168.2.45019092.255.85.239000TCP
                            2025-03-04T21:02:54.266556+010028033053Unknown Traffic192.168.2.45019792.255.85.239000TCP
                            2025-03-04T21:02:55.095852+010028033053Unknown Traffic192.168.2.45019892.255.85.239000TCP
                            2025-03-04T21:02:55.960888+010028033053Unknown Traffic192.168.2.45020092.255.85.239000TCP
                            2025-03-04T21:02:56.827925+010028033053Unknown Traffic192.168.2.45020192.255.85.239000TCP
                            2025-03-04T21:03:00.178904+010028033053Unknown Traffic192.168.2.45020592.255.85.239000TCP
                            2025-03-04T21:03:02.709574+010028033053Unknown Traffic192.168.2.45020892.255.85.239000TCP
                            2025-03-04T21:03:03.524943+010028033053Unknown Traffic192.168.2.45021092.255.85.239000TCP
                            2025-03-04T21:03:04.390359+010028033053Unknown Traffic192.168.2.45021192.255.85.239000TCP
                            2025-03-04T21:03:08.994494+010028033053Unknown Traffic192.168.2.45021792.255.85.239000TCP
                            2025-03-04T21:03:11.515497+010028033053Unknown Traffic192.168.2.45022292.255.85.239000TCP
                            2025-03-04T21:03:17.648588+010028033053Unknown Traffic192.168.2.45022992.255.85.239000TCP
                            2025-03-04T21:03:21.049770+010028033053Unknown Traffic192.168.2.45023392.255.85.239000TCP
                            2025-03-04T21:03:22.824144+010028033053Unknown Traffic192.168.2.45023592.255.85.239000TCP
                            2025-03-04T21:03:24.556032+010028033053Unknown Traffic192.168.2.45023792.255.85.239000TCP
                            2025-03-04T21:03:26.316474+010028033053Unknown Traffic192.168.2.45024092.255.85.239000TCP
                            2025-03-04T21:03:27.155640+010028033053Unknown Traffic192.168.2.45024192.255.85.239000TCP
                            2025-03-04T21:03:29.916329+010028033053Unknown Traffic192.168.2.45024492.255.85.239000TCP
                            2025-03-04T21:03:33.309679+010028033053Unknown Traffic192.168.2.45024992.255.85.239000TCP
                            2025-03-04T21:03:35.819190+010028033053Unknown Traffic192.168.2.45025292.255.85.239000TCP
                            2025-03-04T21:03:36.659511+010028033053Unknown Traffic192.168.2.45025392.255.85.239000TCP
                            2025-03-04T21:03:37.477178+010028033053Unknown Traffic192.168.2.45025492.255.85.239000TCP
                            2025-03-04T21:03:39.269409+010028033053Unknown Traffic192.168.2.45025692.255.85.239000TCP
                            2025-03-04T21:03:45.156152+010028033053Unknown Traffic192.168.2.45026392.255.85.239000TCP
                            2025-03-04T21:03:46.828438+010028033053Unknown Traffic192.168.2.45026592.255.85.239000TCP
                            2025-03-04T21:03:47.654581+010028033053Unknown Traffic192.168.2.45026692.255.85.239000TCP
                            2025-03-04T21:03:49.345708+010028033053Unknown Traffic192.168.2.45026892.255.85.239000TCP
                            2025-03-04T21:03:50.994376+010028033053Unknown Traffic192.168.2.45027092.255.85.239000TCP
                            2025-03-04T21:03:51.837309+010028033053Unknown Traffic192.168.2.45027292.255.85.239000TCP
                            2025-03-04T21:03:52.680509+010028033053Unknown Traffic192.168.2.45027392.255.85.239000TCP
                            2025-03-04T21:03:54.524349+010028033053Unknown Traffic192.168.2.45027492.255.85.239000TCP
                            2025-03-04T21:03:56.165636+010028033053Unknown Traffic192.168.2.45027692.255.85.239000TCP
                            2025-03-04T21:03:57.819595+010028033053Unknown Traffic192.168.2.45027892.255.85.239000TCP
                            2025-03-04T21:04:03.720011+010028033053Unknown Traffic192.168.2.45028792.255.85.239000TCP
                            2025-03-04T21:04:05.530364+010028033053Unknown Traffic192.168.2.45028992.255.85.239000TCP
                            2025-03-04T21:04:08.049148+010028033053Unknown Traffic192.168.2.45029292.255.85.239000TCP
                            2025-03-04T21:04:10.584408+010028033053Unknown Traffic192.168.2.45029592.255.85.239000TCP
                            2025-03-04T21:04:14.941254+010028033053Unknown Traffic192.168.2.45030192.255.85.239000TCP
                            2025-03-04T21:04:17.497036+010028033053Unknown Traffic192.168.2.45030592.255.85.239000TCP
                            2025-03-04T21:04:23.576760+010028033053Unknown Traffic192.168.2.45031392.255.85.239000TCP

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: C:\Users\user\AppData\Local\Temp\igbbbmfixAvira: detection malicious, Label: TR/AVI.Agent.leqri
                            Source: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtmAvira: detection malicious, Label: TR/AVI.Agent.leqri
                            Source: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtmReversingLabs: Detection: 73%
                            Source: C:\Users\user\AppData\Local\Temp\igbbbmfixReversingLabs: Detection: 73%
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                            Source: Binary string: C:\CodeBases\isdev\Redist\Language Independent\i386\ISSetup.pdb source: GELEPLLV.msi, MSI2180.tmp.0.dr
                            Source: Binary string: E:\workdir\vc\rbin\RCClient\SplashWin.pdb,, source: SplashWin.exe, 0000000D.00000000.1696724319.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000D.00000002.1706434101.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000E.00000000.1704944800.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 0000000E.00000002.1764497476.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000002.2137412037.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000000.2080562015.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, GELEPLLV.msi, SplashWin.exe.2.dr, SplashWin.exe.13.dr
                            Source: Binary string: E:\workdir\ProgramDatabase\DuiLib_u.pdbww3 source: SplashWin.exe, 0000000D.00000002.1718713571.000000006C715000.00000002.00000001.01000000.00000006.sdmp, SplashWin.exe, 0000000E.00000002.1773387624.000000006C205000.00000002.00000001.01000000.0000000A.sdmp, SplashWin.exe, 00000018.00000002.2141589828.000000006C715000.00000002.00000001.01000000.0000000A.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr
                            Source: Binary string: wntdll.pdbUGP source: SplashWin.exe, 0000000D.00000002.1713271120.0000000009B30000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.1712346760.00000000097D4000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771941100.00000000096C3000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772567122.0000000009DDF000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772325007.0000000009A20000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012234320.0000000005510000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2011657690.0000000005035000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140701923.0000000009AAA000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2141060581.000000000A1B9000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140892302.0000000009E00000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2303822485.00000000045F4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304221470.0000000004AD0000.00000004.00001000.00020000.00000000.sdmp
                            Source: Binary string: wntdll.pdb source: SplashWin.exe, 0000000D.00000002.1713271120.0000000009B30000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.1712346760.00000000097D4000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771941100.00000000096C3000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772567122.0000000009DDF000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772325007.0000000009A20000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012234320.0000000005510000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2011657690.0000000005035000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140701923.0000000009AAA000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2141060581.000000000A1B9000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140892302.0000000009E00000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2303822485.00000000045F4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304221470.0000000004AD0000.00000004.00001000.00020000.00000000.sdmp
                            Source: Binary string: E:\workdir\ProgramDatabase\DuiLib_u.pdb source: SplashWin.exe, 0000000D.00000002.1718713571.000000006C715000.00000002.00000001.01000000.00000006.sdmp, SplashWin.exe, 0000000E.00000002.1773387624.000000006C205000.00000002.00000001.01000000.0000000A.sdmp, SplashWin.exe, 00000018.00000002.2141589828.000000006C715000.00000002.00000001.01000000.0000000A.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr
                            Source: Binary string: E:\workdir\vc\rbin\RCClient\SplashWin.pdb source: SplashWin.exe, 0000000D.00000000.1696724319.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000D.00000002.1706434101.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000E.00000000.1704944800.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 0000000E.00000002.1764497476.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000002.2137412037.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000000.2080562015.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, GELEPLLV.msi, SplashWin.exe.2.dr, SplashWin.exe.13.dr
                            Source: Binary string: C:\CodeBases\isdev\Src\Runtime\InstallScript\_IsRes2k\0009-English\Debug\_isres_0x0409.pdb source: _isres_0x0409.dll.2.dr
                            Source: Binary string: D:\agent\_work\20\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: SplashWin.exe, 0000000D.00000002.1719036570.000000006C781000.00000020.00000001.01000000.00000005.sdmp, SplashWin.exe, 0000000E.00000002.1773189624.000000006C171000.00000020.00000001.01000000.0000000B.sdmp, SplashWin.exe, 00000018.00000002.2141700392.000000006CF31000.00000020.00000001.01000000.0000000B.sdmp, GELEPLLV.msi, vcruntime140.dll.2.dr, vcruntime140.dll.13.dr
                            Source: Binary string: C:\CodeBases\isdev\Src\Runtime\InstallScript\ISBEW64\x64\Release\ISBEW64.pdb source: ISBEW64.exe, 00000003.00000002.1687243345.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000003.00000000.1686159750.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000002.1687788084.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000000.1686834647.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000002.1689194936.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000000.1687295898.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000000.1687894860.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000002.1689823290.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000002.1692357935.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000000.1688735219.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000000.1690928109.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000002.1710835665.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000002.1695463546.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000000.1692404459.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000002.1696483870.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000000.1693634957.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000002.1697145400.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000000.1694765547.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000000.1695594668.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000002.1700653639.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe.2.dr
                            Source: Binary string: D:\agent\_work\20\s\\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: SplashWin.exe, SplashWin.exe, 0000000E.00000002.1773036551.000000006C0F1000.00000020.00000001.01000000.0000000C.sdmp, SplashWin.exe, 00000018.00000002.2141420693.000000006C621000.00000020.00000001.01000000.0000000C.sdmp, GELEPLLV.msi, msvcp140.dll.13.dr, msvcp140.dll.2.dr
                            Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:Jump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6320D0 _Open_dir,FindFirstFileExW,__Read_dir,FindClose,13_2_6C6320D0
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C1020D0 _Open_dir,FindFirstFileExW,__Read_dir,FindClose,14_2_6C1020D0

                            Networking

                            barindex
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49741 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49740 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49751 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49738 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49747 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49742 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49753 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49739 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49743 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49755 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49748 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49744 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49767 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49757 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49762 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49759 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49750 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49758 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49749 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49769 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49764 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49756 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49775 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49781 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49793 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49806 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49745 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49746 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49818 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49752 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49787 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49766 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49800 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49825 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49843 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49831 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49856 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49849 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49870 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49894 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49887 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49900 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49879 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49907 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49936 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49864 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49917 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49924 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49930 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49968 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49950 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49961 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49974 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49956 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49979 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49998 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49945 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50004 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50024 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50011 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49986 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50017 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50028 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49941 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50040 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50057 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50034 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50051 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50074 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:49992 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50045 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50063 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50080 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50086 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50068 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50096 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50111 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50116 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50119 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50117 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50103 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50122 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50125 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50123 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50118 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50132 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50136 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50126 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50127 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50120 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50144 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50133 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50146 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50138 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50141 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50147 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50145 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50148 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50149 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50152 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50153 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50154 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50156 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50157 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50158 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50159 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50160 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50150 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50161 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50162 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50163 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50164 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50165 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50166 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50168 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50169 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50170 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50171 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50172 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50173 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50174 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50175 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50176 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50177 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50179 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50180 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50181 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50182 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50183 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50185 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50167 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50186 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50184 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50187 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50188 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50189 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50190 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50192 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50193 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50194 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50198 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50200 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50201 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50202 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50203 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50204 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50205 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50206 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50207 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50208 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50211 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50212 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50213 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50214 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50215 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50217 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50219 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50221 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50222 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50223 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50224 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50225 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50226 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50227 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50228 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50229 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50197 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50230 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50233 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50235 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50237 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50239 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50240 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50241 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50242 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50243 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50244 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50245 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50247 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50248 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50250 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50251 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50252 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50253 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50254 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50255 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50256 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50257 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50231 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50236 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50258 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50259 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50260 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50261 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50262 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50210 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50232 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50234 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50249 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50263 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50264 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50265 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50267 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50268 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50269 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50270 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50272 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50274 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50275 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50276 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50277 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50278 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50281 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50283 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50285 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50286 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50287 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50288 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50289 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50290 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50291 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50292 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50293 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50294 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50296 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50297 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50298 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50300 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50301 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50304 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50305 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50306 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50307 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50308 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50309 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50282 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50310 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50311 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50313 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50302 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50266 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50295 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50273 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2052248 - Severity 1 - ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) : 192.168.2.4:50284 -> 92.255.85.23:9000
                            Source: global trafficTCP traffic: 92.255.85.23 ports 9000,1,4,5,7,8,15847
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49738
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49739
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49740
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49741
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49742
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49743
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49744
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49745
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49746
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49747
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49748
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49749
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49750
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49751
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49752
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49753
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49755
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49756
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49757
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49758
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49759
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49762
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49764
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49767
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49769
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49775
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49781
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49787
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49793
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49800
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49806
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49818
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49825
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49831
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49843
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49849
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49856
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49864
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49870
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49879
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49887
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49894
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49900
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49907
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49917
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49924
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49930
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49936
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49941
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49945
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49950
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49956
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49961
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49968
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49974
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49979
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49986
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49992
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49998
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50004
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50011
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50017
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50024 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50024
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50028
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50034
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50040
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50045 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50045
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50051 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50051
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50057
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50063 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50063
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50068
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50074
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50080
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50086 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50086
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50096
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50103
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50111
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50116
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50117 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50117
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50118
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50119
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50120 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50120
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50122
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50123 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50123
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50125
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50126
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50127
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50132
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50133
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50136
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50138
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50141
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50144 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50144
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50145 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50145
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50146 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50146
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50147 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50147
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50148 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50148
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50149 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50149
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50150 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50150
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50152 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50152
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50153
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50154 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50154
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50156
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50157 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50157
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50158 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50158
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50159 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50159
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50160
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50161
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50162 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50162
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50163 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50163
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50164 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50164
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50165
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50166 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50166
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50167 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50167
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50168 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50168
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50169 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50169
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50170 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50170
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50171 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50171
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50172 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50172
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50173
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50174
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50175 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50175
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50176 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50176
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50177
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50179 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50179
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50180 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50180
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50181 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50181
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50182 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50182
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50183
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50184 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50184
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50185
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50186 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50186
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50187
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50188 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50188
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50189 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50189
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50190 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50190
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50192 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50192
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50193
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50194 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50194
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50197
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50198 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50198
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50200 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50200
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50201 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50201
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50202 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50202
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50203 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50203
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50204 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50204
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50205
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50206 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50206
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50207 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50207
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50208 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50208
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50210 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50210
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50211
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50212 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50212
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50213
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50214
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50215
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50217 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50217
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50219
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50221 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50221
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50222 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50222
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50223
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50224 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50224
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50225
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50226 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50226
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50227 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50227
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50228 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50228
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50229 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50229
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50230
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50231 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50231
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50232
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50233
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50234
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50235
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50236 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50236
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50237 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50237
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50239 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50239
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50240
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50241
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50242
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50243 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50243
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50244 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50244
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50245 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50245
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50247 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50247
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50248 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50248
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50249 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50249
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50250 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50250
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50251 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50251
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50252 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50252
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50253 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50253
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50254 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50254
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50255 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50255
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50256 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50256
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50257 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50257
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50258 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50258
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50259 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50259
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50260
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50261 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50261
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50262 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50262
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50263 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50263
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50264 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50264
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50265 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50265
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50266
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50267 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50267
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50268 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50268
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50269 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50269
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50270
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50272
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50273 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50273
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50274 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50274
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50275 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50275
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50276 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50276
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50277 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50277
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50278 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50278
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50281 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50281
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50282 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50282
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50283 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50283
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50284 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50284
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50285 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50285
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50286 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50286
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50287 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50287
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50288 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50288
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50289 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50289
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50290 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50290
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50291 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50291
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50292 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50292
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50293 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50293
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50294 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50294
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50295 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50295
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50296 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50296
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50297 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50297
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50298 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50298
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50300 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50300
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50301 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50301
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50302 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50302
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50304 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50304
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50305 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50305
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50306 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50306
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50307 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50307
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50308 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50308
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50309 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50309
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50310 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50310
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50311 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50311
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50313 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50313
                            Source: global trafficTCP traffic: 192.168.2.4:49737 -> 92.255.85.23:15847
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: Joe Sandbox ViewIP Address: 92.255.85.23 92.255.85.23
                            Source: Joe Sandbox ViewASN Name: SOVTEL-ASRU SOVTEL-ASRU
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49741 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49740 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49751 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49744 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49767 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49757 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49759 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49762 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49749 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49769 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49775 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49818 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49787 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49752 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49825 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49831 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49887 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49900 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49907 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49930 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49968 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49950 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49974 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49945 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50004 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50011 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50028 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50040 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50051 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49992 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50045 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50086 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50096 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50103 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50122 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50123 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50126 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50127 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50120 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50133 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50138 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50145 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50148 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50153 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50160 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50165 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50166 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50168 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50169 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50171 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50173 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50174 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50176 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50182 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50183 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50187 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50189 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50190 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50198 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50200 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50201 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50205 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50208 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50211 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50217 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50222 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50229 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50197 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50233 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50235 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50237 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50240 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50241 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50244 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50252 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50253 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50254 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50256 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50210 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50249 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50263 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50265 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50268 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50270 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50272 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50274 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50276 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50278 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50287 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50289 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50292 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50301 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50305 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50313 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50266 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50295 -> 92.255.85.23:9000
                            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:50273 -> 92.255.85.23:9000
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.85.23
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wbinjget?q=8587D7BC4236146899B093C1B42EFE08 HTTP/1.1Host: 92.255.85.23:9000
                            Source: global trafficDNS traffic detected: DNS query: tse1.mm.bing.net
                            Source: MSBuild.exe, 00000017.00000002.4145959596.00000000029AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://92.255.85.23:9000
                            Source: MSBuild.exe, 00000017.00000002.4145959596.00000000029AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://92.255.85.23:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://ocsp.comodoca.com0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://ocsp.digicert.com0C
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://ocsp.digicert.com0O
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: http://ocsp.sectigo.com0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://s2.symcb.com0
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002911000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://sv.symcd.com0&
                            Source: GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://www.digicert.com/CPS0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                            Source: GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://www.flexerasoftware.com0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.000000000963A000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.000000000952F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.0000000005394000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.0000000009915000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.0000000004953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://www.symauth.com/cps0(
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: http://www.symauth.com/rpa00
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002BE4000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002BE4000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002BE4000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: https://d.symcb.com/cps0%
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: https://d.symcb.com/rpa0
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002BE4000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002BE4000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002BE4000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                            Source: MSBuild.exe, 0000001C.00000002.2305030984.00000000028C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/UPxYyFp8
                            Source: MSBuild.exe, 0000001C.00000002.2305030984.00000000028C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/UPxYyFp8PO
                            Source: SplashWin.exe, 0000000D.00000003.1703628552.0000000000900000.00000004.00000020.00020000.00000000.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr, SplashWin.exe.2.dr, SplashWin.exe.13.drString found in binary or memory: https://sectigo.com/CPS0
                            Source: SplashWin.exe, 0000000D.00000002.1712001428.0000000009690000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771131850.0000000009585000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012085319.00000000053DC000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140527043.000000000996B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmp, GELEPLLV.msi, ISBEW64.exe.2.dr, MSI2008.tmp.0.dr, ISRT.dll.2.drString found in binary or memory: https://www.digicert.com/CPS0
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=
                            Source: MSBuild.exe, 00000017.00000002.4145959596.0000000002BE4000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4149440929.0000000003C78000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002B86000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.4145959596.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                            System Summary

                            barindex
                            Source: 25.2.cmd.exe.4f800c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                            Source: 15.2.cmd.exe.5df00c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                            Source: 25.2.cmd.exe.4f800c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                            Source: 28.2.MSBuild.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                            Source: 15.2.cmd.exe.5df00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                            Source: C:\Users\user\AppData\Local\Temp\igbbbmfix, type: DROPPEDMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                            Source: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtm, type: DROPPEDMatched rule: Detects Arechclient2 RAT Author: ditekSHen
                            Source: ISRT.dll.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess Stats: CPU usage > 49%
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B471AD03_2_00007FF63B471AD0
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47CC643_2_00007FF63B47CC64
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47F11C3_2_00007FF63B47F11C
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47FCE43_2_00007FF63B47FCE4
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47D3083_2_00007FF63B47D308
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B4842FC3_2_00007FF63B4842FC
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B474E103_2_00007FF63B474E10
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B4742303_2_00007FF63B474230
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62645813_2_6C626458
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62642C13_2_6C62642C
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62643013_2_6C626430
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62643413_2_6C626434
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6214F213_2_6C6214F2
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62649413_2_6C626494
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6265EC13_2_6C6265EC
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C621E0713_2_6C621E07
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62661813_2_6C626618
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6266E413_2_6C6266E4
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6266D413_2_6C6266D4
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62536013_2_6C625360
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C62532413_2_6C625324
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C624B0C13_2_6C624B0C
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6253F813_2_6C6253F8
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6253CC13_2_6C6253CC
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6253DC13_2_6C6253DC
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C0F14F214_2_6C0F14F2
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C0F1E0714_2_6C0F1E07
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C0F66D414_2_6C0F66D4
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C0F66E414_2_6C0F66E4
                            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MSI2008.tmp B8FA7AA425E4084EA3721780A13D11E08B8D53D1C5414B73F22FAECA1BFD314F
                            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MSI2180.tmp DB01AA9FD931EDCAFF54D745DAA1D9A377ADAB5E91161DABF53A94C7FCFD0838
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: String function: 6C12E69B appears 123 times
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: String function: 6C12E6CF appears 38 times
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: String function: 6C65E69B appears 123 times
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: String function: 6C65E6CF appears 38 times
                            Source: MSI2180.tmp.0.drStatic PE information: Resource name: PUBLICKEY type: b.out overlay separate pure segmented executable V2.3 186 286 286 386 Large Text Large Data Huge Objects Enabled
                            Source: GELEPLLV.msiBinary or memory string: OriginalFilename_IsIcoRes.exe< vs GELEPLLV.msi
                            Source: GELEPLLV.msiBinary or memory string: OriginalFilenameSFHelper.dll vs GELEPLLV.msi
                            Source: GELEPLLV.msiBinary or memory string: OriginalFilenameSetAllUsers.dll< vs GELEPLLV.msi
                            Source: GELEPLLV.msiBinary or memory string: OriginalFilenamemsvcp140.dllT vs GELEPLLV.msi
                            Source: GELEPLLV.msiBinary or memory string: OriginalFilenameAnyViewer4 vs GELEPLLV.msi
                            Source: GELEPLLV.msiBinary or memory string: OriginalFilenamevcruntime140.dllT vs GELEPLLV.msi
                            Source: GELEPLLV.msiBinary or memory string: OriginalFilenameiKernel.dll vs GELEPLLV.msi
                            Source: 25.2.cmd.exe.4f800c8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                            Source: 15.2.cmd.exe.5df00c8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                            Source: 25.2.cmd.exe.4f800c8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                            Source: 28.2.MSBuild.exe.900000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                            Source: 15.2.cmd.exe.5df00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                            Source: C:\Users\user\AppData\Local\Temp\igbbbmfix, type: DROPPEDMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                            Source: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtm, type: DROPPEDMatched rule: MALWARE_Win_Arechclient2 author = ditekSHen, description = Detects Arechclient2 RAT
                            Source: ISRT.dll.2.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            Source: ISRT.dll.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            Source: 15.2.cmd.exe.5df00c8.7.raw.unpack, -Module-.csCryptographic APIs: 'CreateDecryptor'
                            Source: 25.2.cmd.exe.4f800c8.7.raw.unpack, -Module-.csCryptographic APIs: 'CreateDecryptor'
                            Source: classification engineClassification label: mal100.troj.spyw.evad.winMSI@39/26@1/1
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C632440 _Statvfs,GetDiskFreeSpaceExW,13_2_6C632440
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B473140 CoCreateInstance,3_2_00007FF63B473140
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B475870 LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,3_2_00007FF63B475870
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeFile created: C:\Users\user\AppData\Roaming\Controltool_irhJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7992:120:WilError_03
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\4b6f97056bd3430db6ca6dde5ea6eba9
                            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI2008.tmpJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCommand line argument: AnyViewer13_2_00EE19D0
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCommand line argument: AnyViewer14_2_00D119D0
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\IsConfig.iniJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\GELEPLLV.msi"
                            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 721F7157EC60ED4BDE0DFCD92E791EEC C
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E83174FE-C665-465A-A362-97A8557AEF45}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C7269B72-A4F4-4A43-AD82-18F3A8EDEB2E}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E0BC4BB7-F4AD-4186-90AB-E1483A5D8CF4}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F96A5C8A-D5FB-4FF8-A586-B8E8188D2794}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{02392C44-6D1B-487E-A493-44C3EC06AA27}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C246B97D-1770-433A-A54B-78C6BB3E25A3}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9A403955-82B3-4C45-BC39-9961952DDF3C}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{28E1C0CE-7C15-4622-AE11-9EABAAF98FF8}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{36385D1D-E9F1-44EB-B7AF-C3D9BCFE6308}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{129B1CD9-B0F3-479E-B4D1-596CC8169910}
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exe C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exe
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeProcess created: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exe C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exe
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exe "C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exe"
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 721F7157EC60ED4BDE0DFCD92E791EEC CJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E83174FE-C665-465A-A362-97A8557AEF45}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C7269B72-A4F4-4A43-AD82-18F3A8EDEB2E}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E0BC4BB7-F4AD-4186-90AB-E1483A5D8CF4}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F96A5C8A-D5FB-4FF8-A586-B8E8188D2794}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{02392C44-6D1B-487E-A493-44C3EC06AA27}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C246B97D-1770-433A-A54B-78C6BB3E25A3}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9A403955-82B3-4C45-BC39-9961952DDF3C}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{28E1C0CE-7C15-4622-AE11-9EABAAF98FF8}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{36385D1D-E9F1-44EB-B7AF-C3D9BCFE6308}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{129B1CD9-B0F3-479E-B4D1-596CC8169910}Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exe C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeProcess created: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exe C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                            Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: duilib_u.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: vcruntime140.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: msvcp140.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: dbghelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: pla.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: pdh.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: tdh.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: cabinet.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: wevtapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: shdocvw.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: duilib_u.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: vcruntime140.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: msvcp140.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: vcruntime140.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: dbghelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: pla.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: pdh.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: tdh.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: cabinet.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: wevtapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: shdocvw.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rtutils.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: duilib_u.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: vcruntime140.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: msvcp140.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: vcruntime140.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: vcruntime140.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: dbghelp.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: pla.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: pdh.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: tdh.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: cabinet.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: wevtapi.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: shdocvw.dll
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: winhttp.dll
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dll
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dll
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dll
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dll
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
                            Source: jehdmsow.15.drLNK file: ..\..\Roaming\Controltool_irh\SplashWin.exe
                            Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\IsConfig.iniJump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
                            Source: GELEPLLV.msiStatic file information: File size 6509020 > 1048576
                            Source: Binary string: C:\CodeBases\isdev\Redist\Language Independent\i386\ISSetup.pdb source: GELEPLLV.msi, MSI2180.tmp.0.dr
                            Source: Binary string: E:\workdir\vc\rbin\RCClient\SplashWin.pdb,, source: SplashWin.exe, 0000000D.00000000.1696724319.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000D.00000002.1706434101.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000E.00000000.1704944800.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 0000000E.00000002.1764497476.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000002.2137412037.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000000.2080562015.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, GELEPLLV.msi, SplashWin.exe.2.dr, SplashWin.exe.13.dr
                            Source: Binary string: E:\workdir\ProgramDatabase\DuiLib_u.pdbww3 source: SplashWin.exe, 0000000D.00000002.1718713571.000000006C715000.00000002.00000001.01000000.00000006.sdmp, SplashWin.exe, 0000000E.00000002.1773387624.000000006C205000.00000002.00000001.01000000.0000000A.sdmp, SplashWin.exe, 00000018.00000002.2141589828.000000006C715000.00000002.00000001.01000000.0000000A.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr
                            Source: Binary string: wntdll.pdbUGP source: SplashWin.exe, 0000000D.00000002.1713271120.0000000009B30000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.1712346760.00000000097D4000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771941100.00000000096C3000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772567122.0000000009DDF000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772325007.0000000009A20000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012234320.0000000005510000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2011657690.0000000005035000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140701923.0000000009AAA000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2141060581.000000000A1B9000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140892302.0000000009E00000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2303822485.00000000045F4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304221470.0000000004AD0000.00000004.00001000.00020000.00000000.sdmp
                            Source: Binary string: wntdll.pdb source: SplashWin.exe, 0000000D.00000002.1713271120.0000000009B30000.00000004.00000800.00020000.00000000.sdmp, SplashWin.exe, 0000000D.00000002.1712346760.00000000097D4000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1771941100.00000000096C3000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772567122.0000000009DDF000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 0000000E.00000002.1772325007.0000000009A20000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2012234320.0000000005510000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2011657690.0000000005035000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140701923.0000000009AAA000.00000004.00000020.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2141060581.000000000A1B9000.00000004.00000001.00020000.00000000.sdmp, SplashWin.exe, 00000018.00000002.2140892302.0000000009E00000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2303822485.00000000045F4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.2304221470.0000000004AD0000.00000004.00001000.00020000.00000000.sdmp
                            Source: Binary string: E:\workdir\ProgramDatabase\DuiLib_u.pdb source: SplashWin.exe, 0000000D.00000002.1718713571.000000006C715000.00000002.00000001.01000000.00000006.sdmp, SplashWin.exe, 0000000E.00000002.1773387624.000000006C205000.00000002.00000001.01000000.0000000A.sdmp, SplashWin.exe, 00000018.00000002.2141589828.000000006C715000.00000002.00000001.01000000.0000000A.sdmp, GELEPLLV.msi, DuiLib_u.dll.2.dr, DuiLib_u.dll.13.dr
                            Source: Binary string: E:\workdir\vc\rbin\RCClient\SplashWin.pdb source: SplashWin.exe, 0000000D.00000000.1696724319.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000D.00000002.1706434101.0000000000EE3000.00000002.00000001.01000000.00000004.sdmp, SplashWin.exe, 0000000E.00000000.1704944800.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 0000000E.00000002.1764497476.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000002.2137412037.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, SplashWin.exe, 00000018.00000000.2080562015.0000000000D13000.00000002.00000001.01000000.00000009.sdmp, GELEPLLV.msi, SplashWin.exe.2.dr, SplashWin.exe.13.dr
                            Source: Binary string: C:\CodeBases\isdev\Src\Runtime\InstallScript\_IsRes2k\0009-English\Debug\_isres_0x0409.pdb source: _isres_0x0409.dll.2.dr
                            Source: Binary string: D:\agent\_work\20\s\\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: SplashWin.exe, 0000000D.00000002.1719036570.000000006C781000.00000020.00000001.01000000.00000005.sdmp, SplashWin.exe, 0000000E.00000002.1773189624.000000006C171000.00000020.00000001.01000000.0000000B.sdmp, SplashWin.exe, 00000018.00000002.2141700392.000000006CF31000.00000020.00000001.01000000.0000000B.sdmp, GELEPLLV.msi, vcruntime140.dll.2.dr, vcruntime140.dll.13.dr
                            Source: Binary string: C:\CodeBases\isdev\Src\Runtime\InstallScript\ISBEW64\x64\Release\ISBEW64.pdb source: ISBEW64.exe, 00000003.00000002.1687243345.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000003.00000000.1686159750.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000002.1687788084.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000000.1686834647.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000002.1689194936.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000000.1687295898.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000000.1687894860.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000002.1689823290.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000002.1692357935.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000000.1688735219.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000000.1690928109.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000002.1710835665.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000002.1695463546.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000000.1692404459.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000002.1696483870.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000000.1693634957.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000002.1697145400.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000000.1694765547.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000000.1695594668.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000002.1700653639.00007FF63B487000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe.2.dr
                            Source: Binary string: D:\agent\_work\20\s\\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: SplashWin.exe, SplashWin.exe, 0000000E.00000002.1773036551.000000006C0F1000.00000020.00000001.01000000.0000000C.sdmp, SplashWin.exe, 00000018.00000002.2141420693.000000006C621000.00000020.00000001.01000000.0000000C.sdmp, GELEPLLV.msi, msvcp140.dll.13.dr, msvcp140.dll.2.dr
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B476D00 LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,3_2_00007FF63B476D00
                            Source: initial sampleStatic PE information: section where entry point is pointing to: .rsrc
                            Source: DuiLib_u.dll.2.drStatic PE information: real checksum: 0xda891 should be: 0xe665e
                            Source: DuiLib_u.dll.13.drStatic PE information: real checksum: 0xda891 should be: 0xe665e
                            Source: MSI2180.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x291f39
                            Source: igbbbmfix.25.drStatic PE information: real checksum: 0x0 should be: 0xcdcb2
                            Source: hxyamwavxtmtm.15.drStatic PE information: real checksum: 0x0 should be: 0xcdcb2
                            Source: _isres_0x0409.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x1c5ec2
                            Source: MSI2180.tmp.0.drStatic PE information: section name: .orpc
                            Source: msvcp140.dll.2.drStatic PE information: section name: .didat
                            Source: msvcp140.dll.13.drStatic PE information: section name: .didat
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_00EE2A26 push ecx; ret 13_2_00EE2A39
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C65E675 push ecx; ret 13_2_6C65E688
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C621119 pushad ; retn 0000h13_2_6C6212B0
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_00D12A26 push ecx; ret 14_2_00D12A39
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C12E675 push ecx; ret 14_2_6C12E688
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C0F1119 pushad ; retn 0000h14_2_6C0F12B0
                            Source: ISRT.dll.2.drStatic PE information: section name: .text entropy: 7.9838191086194135
                            Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISRT.dllJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeFile created: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeFile created: C:\Users\user\AppData\Roaming\Controltool_irh\msvcp140.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\_isres_0x0409.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeJump to dropped file
                            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI2008.tmpJump to dropped file
                            Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\DuiLib_u.dllJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeFile created: C:\Users\user\AppData\Roaming\Controltool_irh\vcruntime140.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\igbbbmfixJump to dropped file
                            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI2180.tmpJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeFile created: C:\Users\user\AppData\Roaming\Controltool_irh\DuiLib_u.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\msvcp140.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\vcruntime140.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtmJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtmJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\igbbbmfixJump to dropped file

                            Hooking and other Techniques for Hiding and Protection

                            barindex
                            Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\HXYAMWAVXTMTM
                            Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\IGBBBMFIX
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49738
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49739
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49740
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49741
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49742
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49743
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49744
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49745
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49746
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49747
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49748
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49749
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49750
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49751
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49752
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49753
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49755
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49756
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49757
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49758
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49759
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49762
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49764
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49766
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49767
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49769
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49775
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49781
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49787
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49793
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49800
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49806
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49818
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49825
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49831
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49843
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49849
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49856
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49864
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49870
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49879
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49887
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49894
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49900
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49907
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49917
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49924
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49930
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49936
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49941
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49945
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49950
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49956
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49961
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49968
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49974
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49979
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49986
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49992
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 49998
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50004
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50011
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50017
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50024 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50024
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50028
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50034
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50040
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50045 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50045
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50051 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50051
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50057
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50063 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50063
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50068
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50074
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50080
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50086 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50086
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50096
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50103
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50111
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50116
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50117 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50117
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50118
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50119
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50120 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50120
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50122
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50123 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50123
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50125
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50126
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50127
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50132
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50133
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50136
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50138
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50141
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50144 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50144
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50145 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50145
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50146 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50146
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50147 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50147
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50148 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50148
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50149 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50149
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50150 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50150
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50152 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50152
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50153
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50154 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50154
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50156
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50157 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50157
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50158 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50158
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50159 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50159
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50160
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50161
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50162 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50162
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50163 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50163
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50164 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50164
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50165
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50166 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50166
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50167 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50167
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50168 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50168
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50169 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50169
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50170 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50170
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50171 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50171
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50172 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50172
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50173
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50174
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50175 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50175
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50176 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50176
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50177
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50179 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50179
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50180 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50180
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50181 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50181
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50182 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50182
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50183
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50184 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50184
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50185
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50186 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50186
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50187
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50188 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50188
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50189 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50189
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50190 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50190
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50192 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50192
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50193
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50194 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50194
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50197
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50198 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50198
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50200 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50200
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50201 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50201
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50202 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50202
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50203 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50203
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50204 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50204
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50205
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50206 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50206
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50207 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50207
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50208 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50208
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50210 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50210
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50211
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50212 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50212
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50213
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50214
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50215
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50217 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50217
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50219
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50221 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50221
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50222 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50222
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50223
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50224 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50224
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50225
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50226 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50226
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50227 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50227
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50228 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50228
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50229 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50229
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50230
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50231 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50231
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50232
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50233
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50234
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50235
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50236 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50236
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50237 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50237
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50239 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50239
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50240
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50241
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50242
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50243 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50243
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50244 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50244
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50245 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50245
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50247 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50247
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50248 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50248
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50249 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50249
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50250 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50250
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50251 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50251
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50252 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50252
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50253 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50253
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50254 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50254
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50255 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50255
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50256 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50256
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50257 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50257
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50258 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50258
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50259 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50259
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50260
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50261 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50261
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50262 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50262
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50263 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50263
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50264 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50264
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50265 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50265
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50266
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50267 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50267
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50268 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50268
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50269 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50269
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50270
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50272
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50273 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50273
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50274 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50274
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50275 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50275
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50276 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50276
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50277 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50277
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50278 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50278
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50281 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50281
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50282 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50282
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50283 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50283
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50284 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50284
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50285 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50285
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50286 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50286
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50287 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50287
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50288 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50288
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50289 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50289
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50290 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50290
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50291 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50291
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50292 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50292
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50293 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50293
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50294 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50294
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50295 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50295
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50296 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50296
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50297 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50297
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50298 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50298
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50300 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50300
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50301 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50301
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50302 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50302
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50304 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50304
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50305 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50305
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50306 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50306
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50307 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50307
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50308 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50308
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50309 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50309
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50310 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50310
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50311 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50311
                            Source: unknownNetwork traffic detected: HTTP traffic on port 50313 -> 9000
                            Source: unknownNetwork traffic detected: HTTP traffic on port 9000 -> 50313
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47CC64 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_00007FF63B47CC64
                            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion

                            barindex
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeAPI/Special instruction interceptor: Address: 6C317C44
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeAPI/Special instruction interceptor: Address: 6C317C44
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeAPI/Special instruction interceptor: Address: 6C317945
                            Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C313B54
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: A40000 memory reserve | memory write watch
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2910000 memory reserve | memory write watch
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: C60000 memory reserve | memory write watch
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: C80000 memory reserve | memory write watch
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 28C0000 memory reserve | memory write watch
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 48C0000 memory reserve | memory write watch
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 600000Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2083Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 7608Jump to behavior
                            Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISRT.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\_isres_0x0409.dllJump to dropped file
                            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI2008.tmpJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\igbbbmfixJump to dropped file
                            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI2180.tmpJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtmJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-8970
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_3-8497
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeAPI coverage: 0.9 %
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key enumerated: More than 220 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -60000s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -56891s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59886s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -50375s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59766s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -59136s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59656s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -55078s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59546s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -37220s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59438s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -59918s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59280s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59131s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7812Thread sleep time: -59003s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -49958s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -43003s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -46947s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -46878s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -53997s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7936Thread sleep time: -420000s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -43109s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -57305s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -47952s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -52444s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -50569s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7932Thread sleep time: -1200000s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -55857s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -33962s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -43060s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -56392s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -56976s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -54279s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -54316s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -31013s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -31306s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -52339s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -38080s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7752Thread sleep time: -59115s >= -30000sJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5300Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C6320D0 _Open_dir,FindFirstFileExW,__Read_dir,FindClose,13_2_6C6320D0
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C1020D0 _Open_dir,FindFirstFileExW,__Read_dir,FindClose,14_2_6C1020D0
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C65F71A VirtualQuery,GetSystemInfo,13_2_6C65F71A
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 60000Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 56891Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59886Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 50375Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59766Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59136Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59656Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 55078Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59546Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 37220Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59438Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59918Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59280Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59131Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59003Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 49958Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 43003Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 46947Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 46878Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 53997Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 60000Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 43109Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 57305Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 47952Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 52444Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 50569Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 600000Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 55857Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 33962Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 43060Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 56392Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 56976Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 54279Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 54316Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 31013Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 31306Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 52339Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 38080Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 59115Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                            Source: cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                            Source: cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                            Source: cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                            Source: ISRT.dll.2.drBinary or memory string: _GetVirtualMachineType
                            Source: ISRT.dll.2.drBinary or memory string: _IsVirtualMachine
                            Source: cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                            Source: cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                            Source: cmd.exe, 00000019.00000002.2304030771.000000000499B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                            Source: MSBuild.exe, 00000017.00000002.4143381506.0000000000AE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll$^
                            Source: ISRT.dll.2.drBinary or memory string: AddIconCallDLLFnComponentViewCreateWindowComponentViewDestroyComponentViewRefreshComponentViewSelectAllComponentViewSetInfoComponentViewSetInfoExCreateFolderDeleteFolderDeleteIconEnableHourGlassEnumFoldersItemsGetCPUTypeGetFontSubGetHandleGetPortsGetSelectedItemStateIsEmptyIsNTAdminIsOSTypeNTIsObjectIsPowerUserLangLoadStringMessageBeepPPathCompactPathPixelPathCrackUrlPathGetDirPathGetDrivePathGetFilePathGetFileExtPathGetFileNamePathGetLongFromShortPathGetPathPathIsValidSyntaxQueryIconReadArrayPropertyReadBoolPropertyReadNumberPropertyReplaceIconShowFolderTextSubSubstituteVerGetFileVersionWriteArrayPropertyWriteBoolPropertyWriteNumberPropertyWriteStringProperty_AppSearch_BrowseForFolder_CCPSearch_CHARArrayToWCHARArray_CalculateAndAddFileCost_CleanupInet_CloseFile_CmdGetHwndDlg_CmdGetMsg_CmdGetParam1_CmdGetParam2_CoGetObject_CompareDWORD_ComponentAddItem_ComponentCompareSizeRequired_ComponentError_ComponentErrorInfo_ComponentFileEnum_ComponentFileInfo_ComponentFilterLanguage_ComponentFilterOS_ComponentGetCost_ComponentGetCostEx_ComponentGetData_ComponentGetItemSize_ComponentGetTotalCost_ComponentGetTotalCostEx_ComponentInitialize_ComponentIsItemSelected_ComponentListItems_ComponentLoadTarget_ComponentMoveData_ComponentPatch_ComponentReinstall_ComponentRemoveAll_ComponentRemoveAllInLogOnly_ComponentSaveTarget_ComponentSelectItem_ComponentSelectNew_ComponentSetData_ComponentSetupTypeEnum_ComponentSetupTypeGetData_ComponentSetupTypeSet_ComponentTotalSize_ComponentTransferData_ComponentUpdate_ComponentValidate_ComponentViewCreate_ComponentViewQueryInfo_CopyBytes_CreateDir_CreateObject_CreateRegistrySet_CreateShellObjects_CtrlGetNotificationCode_CtrlGetParentWindowHelper_CtrlGetSubCommand_CtrlGetUrlForLinkClicked_CtrlSetHtmlContent_CtrlSetMLERichText_CtrlSetMLERichTextEx_DIFxDriverPackageGetPath_DIFxDriverPackageInstall_DIFxDriverPackagePreinstall_DIFxDriverPackageUninstall_DefineDialog_DeleteCHARArray_DialogSetFont_DisableBranding_DisableStatus_Divide_DoInstall_DoSprintf_DotNetCoCreateObject_DotNetUnloadAppDomain_EnableDialogCache_EnablePrevDialog_EnableSkins_EnableStatus_EnableWow64FsRedirection_EndDialog_ExistsDir_ExistsDisk_ExistsFile_ExitInstall_FeatureAddCost_FeatureAddUninstallCost_FeatureGetCost_FeatureInitialize_FeatureSpendCost_FeatureSpendUninstallCost_FileCopy_FloatingPointOperation_GenerateFileMD5SignatureHex_GetByte_GetCurrentDialogName_GetDiskInfo_GetDiskSpaceEx_GetDiskSpaceExEx_GetFont_GetGlobalFlags_GetGlobalMemorySize_GetInetFileSize_GetInetFileTime_GetLine_GetLineSize_GetObject_GetObjectByIndex_GetObjectCount_GetProcessorInfo_GetRunningChildProcess_GetRunningChildProcessEx_GetRunningChildProcessEx2_GetSelectedTreeComponent_GetStandardLangId_GetSupportDir_GetSystemDpi_GetTrueTypeFontFileInfo_GetVirtualMachineType_InetEndofTransfer_InetGetLastError_InetGetNextDisk_InitInstall_IsFontTypefaceNameAvailable_IsInAdminGroup_IsLangSupported_IsSkinLoaded_IsVirtualMachine_IsWindowsME_IsWow64_KillProcesses_ListAddItem_ListAddString_ListCount_List
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeAPI call chain: ExitProcess graph end nodegraph_3-8972
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeProcess information queried: ProcessInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47D098 __crtCaptureCurrentContext,IsDebuggerPresent,__crtUnhandledException,3_2_00007FF63B47D098
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B483008 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_00007FF63B483008
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B476D00 LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,3_2_00007FF63B476D00
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47CAE4 GetProcessHeap,3_2_00007FF63B47CAE4
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B47DCD4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF63B47DCD4
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B4807D8 SetUnhandledExceptionFilter,3_2_00007FF63B4807D8
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_00EE27E0 SetUnhandledExceptionFilter,13_2_00EE27E0
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_00EE264A IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00EE264A
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_00EE2529 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00EE2529
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C65EEB8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_6C65EEB8
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_6C65F27B IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_6C65F27B
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_00D127E0 SetUnhandledExceptionFilter,14_2_00D127E0
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_00D1264A IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00D1264A
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_00D12529 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_00D12529
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C12EEB8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_6C12EEB8
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_6C12F27B IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_6C12F27B
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: page read and write | page guard

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeNtQuerySystemInformation: Direct from: 0x6C193538Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeNtQuerySystemInformation: Direct from: 0x6C6A3538
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeNtProtectVirtualMemory: Direct from: 0x6C282AF6Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeNtProtectVirtualMemory: Direct from: 0x6B022B4D
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: read writeJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exe protection: read write
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: read write
                            Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 6B0B1000Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 767008Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 6B0B1000
                            Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 7D5008
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Source: GELEPLLV.msi, MSI2180.tmp.0.drBinary or memory string: ?OPTYPE_PROGMAN_FIELDSWWW
                            Source: GELEPLLV.msi, MSI2180.tmp.0.drBinary or memory string: ISLOG_VERSION_INFO..\..\..\Shared\LogServices2\LogDB.cppOPTYPE_PROGMANISLOGDB_USER_PROPERTIES
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_00EE2835 cpuid 13_2_00EE2835
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: _Getdateorder,___lc_locale_name_func,__crtGetLocaleInfoEx,13_2_6C647770
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: __crtGetLocaleInfoEx,GetLocaleInfoEx,?isfx@?$basic_istream@_WU?$char_traits@_W@std@@@std@@QAEXXZ,GetLocaleInfoEx,GetLocaleInfoW,13_2_6C62C160
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: _Getdateorder,___lc_locale_name_func,__crtGetLocaleInfoEx,14_2_6C117770
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: __crtGetLocaleInfoEx,GetLocaleInfoEx,?isfx@?$basic_istream@_WU?$char_traits@_W@std@@@std@@QAEXXZ,GetLocaleInfoEx,GetLocaleInfoW,14_2_6C0FC160
                            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\{6B7B1304-020A-4C07-94BF-9DA50C0AC2F1}\ISBEW64.exeCode function: 3_2_00007FF63B481128 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00007FF63B481128
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 25.2.cmd.exe.4f800c8.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 15.2.cmd.exe.5df00c8.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 25.2.cmd.exe.4f800c8.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 28.2.MSBuild.exe.900000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 15.2.cmd.exe.5df00c8.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0000000F.00000002.2012956923.0000000005DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000019.00000002.2304532163.0000000004F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000002.2303821346.0000000000902000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8116, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7952, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2720, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\igbbbmfix, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtm, type: DROPPED
                            Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7728, type: MEMORYSTR
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                            Source: Yara matchFile source: 25.2.cmd.exe.4f800c8.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 15.2.cmd.exe.5df00c8.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 25.2.cmd.exe.4f800c8.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 28.2.MSBuild.exe.900000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 15.2.cmd.exe.5df00c8.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0000000F.00000002.2012956923.0000000005DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000019.00000002.2304532163.0000000004F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000002.2303821346.0000000000902000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8116, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7952, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2720, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\igbbbmfix, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtm, type: DROPPED

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: 25.2.cmd.exe.4f800c8.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 15.2.cmd.exe.5df00c8.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 25.2.cmd.exe.4f800c8.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 28.2.MSBuild.exe.900000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 15.2.cmd.exe.5df00c8.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0000000F.00000002.2012956923.0000000005DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000019.00000002.2304532163.0000000004F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000002.2303821346.0000000000902000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8116, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7952, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2720, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\igbbbmfix, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\hxyamwavxtmtm, type: DROPPED
                            Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7728, type: MEMORYSTR
                            Source: C:\Users\user\AppData\Local\Temp\{9B76187E-770E-4DA5-BBE1-15F96754ECC5}\SplashWin.exeCode function: 13_2_00EE13A0 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,13_2_00EE13A0
                            Source: C:\Users\user\AppData\Roaming\Controltool_irh\SplashWin.exeCode function: 14_2_00D113A0 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,14_2_00D113A0
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity InformationAcquire Infrastructure1
                            Replication Through Removable Media
                            221
                            Windows Management Instrumentation
                            11
                            DLL Side-Loading
                            1
                            Abuse Elevation Control Mechanism
                            1
                            Disable or Modify Tools
                            1
                            OS Credential Dumping
                            1
                            System Time Discovery
                            Remote Services11
                            Archive Collected Data
                            1
                            Ingress Tool Transfer
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts2
                            Native API
                            Boot or Logon Initialization Scripts11
                            DLL Side-Loading
                            11
                            Deobfuscate/Decode Files or Information
                            LSASS Memory11
                            Peripheral Device Discovery
                            Remote Desktop Protocol1
                            Data from Local System
                            1
                            Encrypted Channel
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain Accounts2
                            Command and Scripting Interpreter
                            Logon Script (Windows)212
                            Process Injection
                            1
                            Abuse Elevation Control Mechanism
                            Security Account Manager3
                            File and Directory Discovery
                            SMB/Windows Admin SharesData from Network Shared Drive11
                            Non-Standard Port
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                            Obfuscated Files or Information
                            NTDS247
                            System Information Discovery
                            Distributed Component Object ModelInput Capture2
                            Non-Application Layer Protocol
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                            Software Packing
                            LSA Secrets451
                            Security Software Discovery
                            SSHKeylogging2
                            Application Layer Protocol
                            Scheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                            DLL Side-Loading
                            Cached Domain Credentials12
                            Process Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                            Masquerading
                            DCSync241
                            Virtualization/Sandbox Evasion
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job241
                            Virtualization/Sandbox Evasion
                            Proc Filesystem1
                            Application Window Discovery
                            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                            Process Injection
                            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1629534 Sample: GELEPLLV.msi Startdate: 04/03/2025 Architecture: WINDOWS Score: 100 76 tse1.mm.bing.net 2->76 78 mm-mm.bing.net.trafficmanager.net 2->78 80 2 other IPs or domains 2->80 84 Suricata IDS alerts for network traffic 2->84 86 Malicious sample detected (through community Yara rule) 2->86 88 Antivirus detection for dropped file 2->88 90 7 other signatures 2->90 11 msiexec.exe 2->11         started        13 SplashWin.exe 2->13         started        16 msiexec.exe 7 2->16         started        signatures3 process4 file5 19 msiexec.exe 56 11->19         started        114 Maps a DLL or memory area into another process 13->114 116 Found direct / indirect Syscall (likely to bypass EDR) 13->116 22 cmd.exe 13->22         started        52 C:\Users\user\AppData\Local\...\MSI2180.tmp, PE32 16->52 dropped 54 C:\Users\user\AppData\Local\...\MSI2008.tmp, PE32 16->54 dropped signatures6 process7 file8 56 C:\Users\user\AppData\...\vcruntime140.dll, PE32 19->56 dropped 58 C:\Users\user\AppData\Local\...\msvcp140.dll, PE32 19->58 dropped 60 C:\Users\user\AppData\Local\...\SplashWin.exe, PE32 19->60 dropped 64 4 other malicious files 19->64 dropped 25 SplashWin.exe 7 19->25         started        29 ISBEW64.exe 19->29         started        31 ISBEW64.exe 19->31         started        37 8 other processes 19->37 62 C:\Users\user\AppData\Local\Temp\igbbbmfix, PE32 22->62 dropped 92 Writes to foreign memory regions 22->92 94 Maps a DLL or memory area into another process 22->94 33 conhost.exe 22->33         started        35 MSBuild.exe 22->35         started        signatures9 process10 file11 66 C:\Users\user\AppData\...\vcruntime140.dll, PE32 25->66 dropped 68 C:\Users\user\AppData\...\msvcp140.dll, PE32 25->68 dropped 70 C:\Users\user\AppData\...\SplashWin.exe, PE32 25->70 dropped 72 C:\Users\user\AppData\...\DuiLib_u.dll, PE32 25->72 dropped 102 Switches to a custom stack to bypass stack traces 25->102 104 Found direct / indirect Syscall (likely to bypass EDR) 25->104 39 SplashWin.exe 1 25->39         started        signatures12 process13 signatures14 96 Maps a DLL or memory area into another process 39->96 98 Switches to a custom stack to bypass stack traces 39->98 100 Found direct / indirect Syscall (likely to bypass EDR) 39->100 42 cmd.exe 4 39->42         started        process15 file16 74 C:\Users\user\AppData\Local\...\hxyamwavxtmtm, PE32 42->74 dropped 106 Writes to foreign memory regions 42->106 108 Found hidden mapped module (file has been removed from disk) 42->108 110 Maps a DLL or memory area into another process 42->110 112 Switches to a custom stack to bypass stack traces 42->112 46 MSBuild.exe 15 5 42->46         started        50 conhost.exe 42->50         started        signatures17 process18 dnsIp19 82 92.255.85.23, 15847, 49737, 49738 SOVTEL-ASRU Russian Federation 46->82 118 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 46->118 120 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 46->120 122 Tries to harvest and steal browser information (history, passwords, etc) 46->122 signatures20

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.