This section summarizes the changes in network traffic
after this threat was executed in a controlled environment. Such
information is critical because a threat must engage in network
activity in order to realize its goals. Threat Connect provides
links to reports about threats that exhibit similar behavior.