Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
Analysis ID:1632196
MD5:06ee2174e93d7559b745655790d2d060
SHA1:c751b6482675a1f1676decec961a1cce34e3971c
SHA256:ab3b34448f6154ef6edbe6d90a1ed98eec54704d048055951602dae3729eb2cf
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

Score:92
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Queries temperature or sensor information (via WMI often done to detect virtual machines)
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Browser Execution In Headless Mode
Sigma detected: Browser Started with Remote Debugging
Tries to detect if online games are installed (MineCraft, World Of Warcraft etc)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe (PID: 8516 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe" MD5: 06EE2174E93D7559B745655790D2D060)
    • tasklist.exe (PID: 8628 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8704 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8756 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8824 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8876 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8936 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8996 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 9004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 9072 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 9080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 9140 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 9148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 9196 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 9204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8164 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 6628 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 6716 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 6780 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 3592 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 1572 cmdline: "tasklist" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 8856 cmdline: "taskkill" /F /IM Discord.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • conhost.exe (PID: 8828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 7452 cmdline: "tasklist" /FI "IMAGENAME eq msedge.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 7492 cmdline: "tasklist" /FI "IMAGENAME eq chrome.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msedge.exe (PID: 8960 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized MD5: 69222B8101B0601CC6663F8381E7E00F)
      • msedge.exe (PID: 3200 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1584 --field-trial-handle=1460,i,15420184414412820723,15264307004454752543,262144 --disable-features=PaintHolding /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • chrome.exe (PID: 8964 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --restore-last-session --remote-debugging-port=8335 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data" --profile-directory=Default --start-minimized MD5: E81F54E6C1129887AEA47E7D092680BF)
      • chrome.exe (PID: 2968 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2092 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
      • chrome.exe (PID: 4932 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=4664 /prefetch:8 MD5: E81F54E6C1129887AEA47E7D092680BF)
    • tasklist.exe (PID: 8428 cmdline: "tasklist" /FI "IMAGENAME eq chrome.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 6592 cmdline: "taskkill" /F /IM chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • conhost.exe (PID: 6436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8404 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8744 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8676 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 7384 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 6372 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 2580 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8648 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8896 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8948 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 8904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 8976 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 940 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 2052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 6768 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 2832 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tasklist.exe (PID: 6776 cmdline: "tasklist" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • conhost.exe (PID: 5264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, CommandLine: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, NewProcessName: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, OriginalFileName: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, ParentProcessId: 8516, ParentProcessName: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, ProcessCommandLine: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, ProcessId: 8960, ProcessName: msedge.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, CommandLine: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, NewProcessName: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, OriginalFileName: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, ParentProcessId: 8516, ParentProcessName: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, ProcessCommandLine: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, ProcessId: 8960, ProcessName: msedge.exe
Source: Process startedAuthor: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, CommandLine: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, NewProcessName: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, OriginalFileName: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, ParentProcessId: 8516, ParentProcessName: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, ProcessCommandLine: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized, ProcessId: 8960, ProcessName: msedge.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeAvira: detected
Source: https://cats.standardshop.xyz/api/logAvira URL Cloud: Label: malware
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeReversingLabs: Detection: 79%
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeVirustotal: Detection: 65%Perma Link
Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.5:49695 version: TLS 1.2
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: chrome.exeMemory has grown: Private usage: 1MB later: 39MB
Source: global trafficHTTP traffic detected: GET /cepitalove/age-of-empires-pro-hack/main/README.md HTTP/1.1accept: */*host: raw.githubusercontent.com
Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1accept: */*host: ipwhois.app
Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /cepitalove/age-of-empires-pro-hack/main/README.md HTTP/1.1accept: */*host: raw.githubusercontent.com
Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1accept: */*host: ipwhois.app
Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
Source: global trafficDNS traffic detected: DNS query: tools.google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: ipwhois.app
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C39B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491364865.000002B5C39B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1315975260.000002B5C3663000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36E8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C3991000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1323216132.000002B5C369D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1321771678.000002B5C360B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338161706.000002B5C36DA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1336020928.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1478938212.000002B5C358A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1336103952.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1556225327.000002B5C3582000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C39B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491364865.000002B5C39B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1315975260.000002B5C3663000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36E8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C3991000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1402545461.000002B5C371B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1323216132.000002B5C369D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1321771678.000002B5C360B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1479285492.000002B5C3582000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1399560149.000002B5C3714000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338161706.000002B5C36DA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1336020928.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1478938212.000002B5C358A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1336103952.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1556225327.000002B5C3582000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C39B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491364865.000002B5C39B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1323216132.000002B5C369D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1321771678.000002B5C360B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1315975260.000002B5C3663000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36E8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338161706.000002B5C36DA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1336020928.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1478938212.000002B5C358A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1336103952.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C3991000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3993000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1556225327.000002B5C3582000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C3991000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com1.3.6.1.5.5.7.48.2http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C3991000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crl
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://ac.ecosia.org?q=
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1495239419.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1557145744.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1416885079.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1398451713.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491447938.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1419910566.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1494804175.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392432949.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1495434881.000002B5C36CE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1558640739.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1478682955.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1413837007.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cats.standardshop.xyz/api/log
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support/rust/deps
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1414081676.000002B5C3991000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1554396826.000002B5C399E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1475595352.000002B5C39E2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1493326837.000002B5C399E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1414664171.000002B5C399C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1333151608.000002B5C35A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1393490815.000002B5C397E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1319913047.000002B5C36A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://gemini.google.com/app?q=
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: https://ipwhois.app/json/
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: https://ipwhois.app/json/0
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: https://raw.githubusercontent.com/cepitalove/age-of-empires-pro-hack/main/README.md
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1334733045.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474665569.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491162652.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C39DE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/cepitalove/age-of-empires-pro-hack/main/README.md4
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1334733045.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474665569.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491162652.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C39DE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/cepitalove/age-of-empires-pro-hack/main/README.md:
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://www.ecosia.org/newtab/v20
Source: temp_login_3426647817.db.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49675
Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.5:49695 version: TLS 1.2
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeBinary string: Afdfd\Device\Afd\Mio
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeBinary string: Failed to open \Device\Afd\Mio:
Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@131/10@19/5
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFile created: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\chrome_debug.log
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8884:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8788:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6364:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8924:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8404:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8636:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8904:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8672:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6140:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5264:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6660:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6724:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8712:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8944:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6588:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9004:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8316:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6672:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6344:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8656:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:180:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8832:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6792:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8828:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9204:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7436:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8764:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6436:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2052:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8244:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9148:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9080:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile created: C:\Users\user\AppData\Local\Temp\PrysmaxJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "Discord.exe")
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'MSEDGE.EXE'
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'CHROME.EXE'
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'CHROME.EXE'
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe")
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT data FROM %Q.'%q_node' WHERE nodeno=?Node %lld missing from databaseNode %lld is too small (%d bytes)Rtree depth out of range (%d)Node %lld is too small for cell count of %d (%d bytes)Dimension %d of cell %d on node %lld is corruptDimension %d of cell %d on node %lld is corrupt relative to parentokwrong number of arguments to function rtreecheck()SELECT * FROM %Q.'%q_rowid'Schema corrupt or not an rtree_rowid_parentENDsqlite_stat1SELECT tbl,idx,stat FROM %Q.sqlite_stat1sqlite_stat4SELECT idx,count(*) FROM %Q.sqlite_stat4 GROUP BY idxSELECT idx,neq,nlt,ndlt,sample FROM %Q.sqlite_stat4SELECT count(*) FROM %Q.'%q_%s'cannot open value of type %sno such rowid: %lldtemporary table name must be unqualified%s %T already existsthere is already an index named %sparameters are not allowed in viewsno such viewno such tablepragma_BEFOREAFTERtemporary trigger may not have qualified namecannot create triggers on virtual tablestrigger %T already existscannot create trigger on system tablecannot create %s trigger on view: %Scannot create INSTEAD OF trigger on table: %Svirtual tables may not be alteredCannot add a column to a viewsqlite_altertab_%scannot UPDATE generated column "%s"rows updated-- TRIGGER %scannot INSERT into generated column "%s"table %S has no column named %stable %S has %d columns but %d values were supplied%d values for %d columnsUPSERT not implemented for virtual table "%s"cannot UPSERT a view%r %sON CONFLICT clause does not match any PRIMARY KEY or UNIQUE constraintrows insertedrows deletedforeign keyindexedcannot open virtual table: %scannot open table without rowid: %scannot open view: %sno such column: "%s"cannot open %s column for writingblockDELETE FROM %Q.'%q_data';DELETE FROM %Q.'%q_idx';DELETE FROM %Q.'%q_docsize';version%s_nodedata
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1558640739.000002B5C361F000.00000004.00000020.00020000.00000000.sdmp, temp_login_1142121714.db.0.dr, temp_login_301337332.db.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000000.1302665090.00007FF790AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeReversingLabs: Detection: 79%
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeVirustotal: Detection: 65%
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: --start-minimizedhttp://localhost:/json
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: --start-minimizedhttp://localhost:/jsonq
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: /root/.cargo/registry/src/index.crates.io-6f17d22bba15001f/regex-automata-0.4.9/src/meta/stopat.rs
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: /root/.cargo/registry/src/index.crates.io-6f17d22bba15001f/regex-automata-0.4.9/src/meta/stopat.rs
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: i\0/root/.cargo/registry/src/index.crates.io-6f17d22bba15001f/regex-automata-0.4.9/src/meta/stopat.rs
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: i\0/root/.cargo/registry/src/index.crates.io-6f17d22bba15001f/regex-automata-0.4.9/src/meta/stopat.rs
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: -START(X"8@
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: /root/.cargo/registry/src/index.crates.io-6f17d22bba15001f/tokio-1.43.0/src/net/addr.rs
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeString found in binary or memory: E/root/.cargo/registry/src/index.crates.io-6f17d22bba15001f/tokio-1.43.0/src/net/addr.rs
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FO CSV /NH
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM Discord.exe
Source: C:\Windows\System32\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq msedge.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq chrome.exe"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --restore-last-session --remote-debugging-port=8335 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data" --profile-directory=Default --start-minimized
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1584 --field-trial-handle=1460,i,15420184414412820723,15264307004454752543,262144 --disable-features=PaintHolding /prefetch:3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2092 /prefetch:3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=4664 /prefetch:8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq chrome.exe"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM chrome.exe
Source: C:\Windows\System32\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FO CSV /NHJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM Discord.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq msedge.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq chrome.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimizedJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --restore-last-session --remote-debugging-port=8335 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data" --profile-directory=Default --start-minimizedJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq chrome.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM chrome.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1584 --field-trial-handle=1460,i,15420184414412820723,15264307004454752543,262144 --disable-features=PaintHolding /prefetch:3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2092 /prefetch:3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=4664 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: cryptnet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic file information: File size 6332737 > 1048576
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2fba00
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x112400
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeWMI Queries: IWbemServices::ExecQuery - root\WMI : SELECT * FROM MSAcpi_ThermalZoneTemperature
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1307640968.000002B5C3468000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1307611154.000002B5C3454000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flush
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: temp_login_3547297474.db.0.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
Source: temp_login_3547297474.db.0.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
Source: temp_login_3547297474.db.0.drBinary or memory string: global block list test formVMware20,11696428655
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipes
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392512613.000002B5C3971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1331915725.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474274852.000002B5C3991000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308730073.000002B5C34A2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308565485.000002B5C34A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1312310968.000002B5C34C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time48
Source: temp_login_3547297474.db.0.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308408592.000002B5C3504000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308386530.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308304093.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308117704.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308210673.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848P
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308635607.000002B5C349F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: y4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition
Source: temp_login_3547297474.db.0.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308623754.000002B5C3479000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1307593486.000002B5C346F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308055754.000002B5C347E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec
Source: temp_login_3547297474.db.0.drBinary or memory string: AMC password management pageVMware20,11696428655
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes
Source: temp_login_3547297474.db.0.drBinary or memory string: tasks.office.comVMware20,11696428655o
Source: temp_login_3547297474.db.0.drBinary or memory string: interactivebrokers.comVMware20,11696428655
Source: temp_login_3547297474.db.0.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
Source: temp_login_3547297474.db.0.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
Source: temp_login_3547297474.db.0.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V HypervisorXV
Source: temp_login_3547297474.db.0.drBinary or memory string: bankofamerica.comVMware20,11696428655x
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root PartitionfJ
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid Partition9S
Source: temp_login_3547297474.db.0.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308861100.000002B5C344A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ime4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page Fault Intercepts/sec5038Page Fault Intercepts Cost5040NMI Interrupts/sec5042NMI Interrupts Cost5044Guest Page Table Maps/sec5046Large Page TLB Fills/sec5048Small Page TLB Fills/sec5050Reflected Guest Page Faults/sec5052APIC MMIO Accesses/sec5054IO Intercept Messages/sec5056Memory Intercept Messages/sec5058APIC EOI Accesses/s
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1312170845.000002B5C3496000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O T
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionll
Source: temp_login_3547297474.db.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V jrxicchxlprunhr Bus Pipes
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308519357.000002B5C349B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flus
Source: temp_login_3547297474.db.0.drBinary or memory string: discord.comVMware20,11696428655f
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1312334252.000002B5C3457000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1312204469.000002B5C345B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshotter
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
Source: temp_login_3547297474.db.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor.dll
Source: temp_login_3547297474.db.0.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
Source: temp_login_3547297474.db.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
Source: temp_login_3547297474.db.0.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
Source: temp_login_3547297474.db.0.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
Source: temp_login_3547297474.db.0.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
Source: temp_login_3547297474.db.0.drBinary or memory string: outlook.office365.comVMware20,11696428655t
Source: temp_login_3547297474.db.0.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
Source: temp_login_3547297474.db.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
Source: temp_login_3547297474.db.0.drBinary or memory string: outlook.office.comVMware20,11696428655s
Source: temp_login_3547297474.db.0.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
Source: temp_login_3547297474.db.0.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service#_
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/&_
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipesl
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipes
Source: temp_login_3547297474.db.0.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root PartitionW[
Source: temp_login_3547297474.db.0.drBinary or memory string: dev.azure.comVMware20,11696428655j
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processorb.sys
Source: temp_login_3547297474.db.0.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service?
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor%K`
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor]R
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual ProcessorS^
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V jrxicchxlprunhr Bus
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisorn[IE
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308226148.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308141553.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308320603.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308386530.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308408592.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308304093.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308117704.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1308210673.000002B5C34FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: e: Cache partial file segments9604Hosted Cache: Client file segment offers made9606Retrieval: Average branch rate9608Discovery: Successful discoveries9610Hosted Cache: Segment offers queue size9612Publication Cache: Published contents9614Local Cache: Average access time3432WSMan Quota Statistics3434Total Requests/Second3436User Quota Violations/Second3438System Quota Violations/Second3440Active Shells3442Active Operations3444Active Users3446Process ID1914Hyper-V VM Vid Partition1916Physical Pages Allocated1918Preferred NUMA Node Index1920Remote Physical Pages1922ClientHandles1924CompressPackTimeInUs1926CompressUnpackTimeInUs1928CompressPackInputSizeInBytes1930CompressUnpackInputSizeInBytes1932CompressPackOutputSizeInBytes1934CompressUnpackOutputSizeInBytes1936CompressUnpackUncompressedInputSizeInBytes1938CompressPackDiscardedSizeInBytes1940CompressWorkspaceSizeInBytes1942CompressScratchPoolSizeInBytes1944CryptPackTimeInUs1946CryptUnpackTimeInUs1948CryptPackInputSizeInBytes1950CryptUnpackInputSizeInBytes1952CryptPackOutputSizeInBytes1954CryptUnpackOutputSizeInBytes1956CryptScratchPoolSizeInBytes
Source: temp_login_3547297474.db.0.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496255341.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1338784595.000002B5C1B7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1329369845.000002B5C1B6E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1496585479.000002B5C1B7D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1553694161.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3B69000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C3A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration ServiceO
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtQuerySystemInformation: Indirect: 0x7FF79098913CJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtReadFile: Indirect: 0x7FF790971D84Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtCreateFile: Indirect: 0x7FF79088B163Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtQueryInformationProcess: Indirect: 0x7FF790983D9FJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtReadFile: Indirect: 0x7FF79096CBBEJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtDeviceIoControlFile: Indirect: 0x7FF79088A93CJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtQueryInformationProcess: Indirect: 0x7FF790984D36Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtQueryInformationProcess: Indirect: 0x7FF790983D40Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtQueryInformationProcess: Indirect: 0x7FF790984E43Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeNtReadFile: Indirect: 0x7FF79096D051Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FO CSV /NHJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM Discord.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq msedge.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq chrome.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimizedJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --restore-last-session --remote-debugging-port=8335 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data" --profile-directory=Default --start-minimizedJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq chrome.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM chrome.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM Discord.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Windows\System32\taskkill.exe "taskkill" /F /IM chrome.exeJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1315107057.000002B5C3691000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1404996252.000002B5C3A3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1315107057.000002B5C3691000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1404996252.000002B5C3A3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndD
Source: SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1315107057.000002B5C3691000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1404996252.000002B5C3A3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Program Files\Google\Chrome\Application\chrome.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Autofill VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AmountExtractionHeuristicRegexes VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\FileTypePolicies VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\OptimizationGuidePredictionModels VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\First Run VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\OriginTrials VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\RecoveryImproved VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Safe Browsing VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\first_party_sets.db-journal VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\GrShaderCache VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\OptimizationHints VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\OriginTrials VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\PrivacySandboxAttestationsPreloaded VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\RecoveryImproved VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Minecraft_Java VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Lunar_Client VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Epic_Games VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Badlion VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Minecraft_Bedrock VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\League_of_Legends VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Valorant VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Steam VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Growtopia VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Battle.net VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Ubisoft_Connect VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Rockstar_Social_Club VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\GOG_Galaxy VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\EA_Desktop VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax\Games\Counter-Strike_2 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Windows\Web\Wallpaper\Windows\img0.jpg VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Prysmax VolumeInformationJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BookmarksJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Slimjet\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Comodo\Dragon\User Data\Default\Local Extension SettingsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Comodo\Dragon\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\Local StateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Avira\Browser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\Local StateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\CocCoc\Browser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\UCBrowser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\CentBrowser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Chromium\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\SRWare Iron\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\Local StateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\Local StateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Yandex\YandexBrowser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Maxthon\Application\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.defaultJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Epic Privacy Browser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Iridium\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Vivaldi\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Comodo\Dragon\User Data\Default\BookmarksJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Torch\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\AVAST Software\Browser\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-releaseJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Blisk\User Data\Default\HistoryJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\Local StateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldbJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldbJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Coinomi\Coinomi\walletsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened / queried: C:\Users\user\AppData\Roaming\.minecraftJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeFile opened / queried: C:\Users\user\AppData\Roaming\.minecraftJump to behavior

Remote Access Functionality

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Windows Management Instrumentation
1
DLL Side-Loading
12
Process Injection
1
Masquerading
1
OS Credential Dumping
11
Security Software Discovery
Remote Services21
Data from Local System
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
11
Disable or Modify Tools
LSASS Memory3
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Remote Access Software
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
12
Process Injection
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
Abuse Elevation Control Mechanism
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeylogging3
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Extra Window Memory Injection
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632196 Sample: SecuriteInfo.com.Win64.Cryp... Startdate: 07/03/2025 Architecture: WINDOWS Score: 92 38 tools.l.google.com 2->38 40 tools.google.com 2->40 42 2 other IPs or domains 2->42 58 Antivirus detection for URL or domain 2->58 60 Antivirus / Scanner detection for submitted sample 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 Sigma detected: Potential Data Stealing Via Chromium Headless Debugging 2->64 8 SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe 46 2->8         started        signatures3 process4 dnsIp5 50 ipwhois.app 195.201.57.90, 443, 49714 HETZNER-ASDE Germany 8->50 52 raw.githubusercontent.com 185.199.109.133, 443, 49695 FASTLYUS Netherlands 8->52 54 127.0.0.1 unknown unknown 8->54 66 Attempt to bypass Chrome Application-Bound Encryption 8->66 68 Tries to harvest and steal browser information (history, passwords, etc) 8->68 70 Tries to steal Crypto Currency Wallets 8->70 72 2 other signatures 8->72 12 chrome.exe 8->12         started        15 tasklist.exe 1 8->15         started        17 tasklist.exe 1 8->17         started        19 34 other processes 8->19 signatures6 process7 dnsIp8 56 192.168.2.5, 138, 443, 49675 unknown unknown 12->56 21 chrome.exe 12->21         started        24 chrome.exe 12->24         started        26 conhost.exe 15->26         started        28 conhost.exe 17->28         started        30 conhost.exe 19->30         started        32 conhost.exe 19->32         started        34 conhost.exe 19->34         started        36 31 other processes 19->36 process9 dnsIp10 44 www.google.com 142.250.186.68, 443, 49712 GOOGLEUS United States 21->44 46 tools.l.google.com 21->46 48 tools.google.com 21->48

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe79%ReversingLabsWin64.Trojan.Amadey
SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe65%VirustotalBrowse
SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe100%AviraTR/Crypt.Agent.xbohj
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://cats.standardshop.xyz/api/log100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
ipwhois.app
195.201.57.90
truefalse
    high
    raw.githubusercontent.com
    185.199.109.133
    truefalse
      high
      tools.l.google.com
      172.217.18.14
      truefalse
        high
        www.google.com
        142.250.186.68
        truefalse
          high
          tools.google.com
          unknown
          unknownfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.google.com/images/branding/product/ico/googleg_alldp.icotemp_login_3426647817.db.0.drfalse
              high
              https://ipwhois.app/json/SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exefalse
                high
                https://raw.githubusercontent.com/cepitalove/age-of-empires-pro-hack/main/README.md:SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1334733045.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474665569.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491162652.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C39DE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.ecosia.org/newtab/v20temp_login_3426647817.db.0.drfalse
                    high
                    https://duckduckgo.com/ac/?q=temp_login_3426647817.db.0.drfalse
                      high
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchtemp_login_3426647817.db.0.drfalse
                        high
                        https://duckduckgo.com/chrome_newtabv209htemp_login_3426647817.db.0.drfalse
                          high
                          https://cats.standardshop.xyz/api/logSecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1495239419.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1557145744.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1416885079.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1398451713.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491447938.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1419910566.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1494804175.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1392432949.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1495434881.000002B5C36CE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1558640739.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1478682955.000002B5C36C6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1413837007.000002B5C36B7000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=temp_login_3426647817.db.0.drfalse
                            high
                            https://ac.ecosia.org?q=temp_login_3426647817.db.0.drfalse
                              high
                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=temp_login_3426647817.db.0.drfalse
                                high
                                https://docs.rs/getrandom#nodejs-es-module-support/rust/depsSecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exefalse
                                  high
                                  https://ipwhois.app/json/0SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exefalse
                                    high
                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=temp_login_3426647817.db.0.drfalse
                                      high
                                      https://gemini.google.com/app?q=temp_login_3426647817.db.0.drfalse
                                        high
                                        https://raw.githubusercontent.com/cepitalove/age-of-empires-pro-hack/main/README.mdSecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exefalse
                                          high
                                          https://raw.githubusercontent.com/cepitalove/age-of-empires-pro-hack/main/README.md4SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1334733045.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1474665569.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1491162652.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1408590210.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1316916297.000002B5C39DE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe, 00000000.00000003.1397690737.000002B5C3ADE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            142.250.186.68
                                            www.google.comUnited States
                                            15169GOOGLEUSfalse
                                            185.199.109.133
                                            raw.githubusercontent.comNetherlands
                                            54113FASTLYUSfalse
                                            195.201.57.90
                                            ipwhois.appGermany
                                            24940HETZNER-ASDEfalse
                                            IP
                                            127.0.0.1
                                            192.168.2.5
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1632196
                                            Start date and time:2025-03-07 20:44:44 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 8m 7s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:80
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            Detection:MAL
                                            Classification:mal92.troj.spyw.evad.winEXE@131/10@19/5
                                            EGA Information:Failed
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 23.60.203.209, 142.250.184.195, 142.250.181.238, 142.250.185.142, 173.194.76.84, 142.250.184.238, 142.250.186.174, 150.171.28.254, 150.171.28.10
                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, clientservices.googleapis.com, g.bing.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, clients2.google.com, redirector.gvt1.com, e16604.f.akamaiedge.net, clients.l.google.com, prod.fs.microsoft.com.akadns.net
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                            • Report size getting too big, too many NtOpenFile calls found.
                                            • Report size getting too big, too many NtOpenKey calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            No simulations
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            185.199.109.133cr_asm3.ps1Get hashmaliciousUnknownBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                            gabe.ps1Get hashmaliciousUnknownBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                            5UIy3bo46y.dllGet hashmaliciousUnknownBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                            HQsitBLlOv.dllGet hashmaliciousUnknownBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                            steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                            OSLdZanXNc.exeGet hashmaliciousUnknownBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                            steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                            SecuriteInfo.com.Trojan.GenericKD.74126573.27896.28845.dllGet hashmaliciousMetasploitBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                            SecuriteInfo.com.Win64.MalwareX-gen.11827.5130.dllGet hashmaliciousAsyncRAT, XWormBrowse
                                            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                            195.201.57.90sender.exeGet hashmaliciousLuca StealerBrowse
                                            • /?output=json
                                            sender.exeGet hashmaliciousLuca StealerBrowse
                                            • /?output=json
                                            Flash_USDT_Sender.exeGet hashmaliciousLuca StealerBrowse
                                            • /?output=json
                                            Flash_USDT_Sender.exeGet hashmaliciousLuca StealerBrowse
                                            • /?output=json
                                            SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                            • /?output=json
                                            765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                            • /?output=json
                                            765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                            • /?output=json
                                            WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                            • /?output=json
                                            ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                            • ipwhois.app/xml/
                                            cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                            • /?output=json
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            raw.githubusercontent.comV1CCX70AZ8P70ADNI.exeGet hashmaliciousClipboard HijackerBrowse
                                            • 185.199.111.133
                                            wcae.exeGet hashmaliciousUnknownBrowse
                                            • 185.199.108.133
                                            wcae.exeGet hashmaliciousUnknownBrowse
                                            • 185.199.109.133
                                            OPwuNqXuHv.exeGet hashmaliciousUnknownBrowse
                                            • 185.199.108.133
                                            downloader.exeGet hashmaliciousUnknownBrowse
                                            • 185.199.110.133
                                            r-c.exeGet hashmaliciousPython Stealer, Empyrean, Quasar, Discord Token StealerBrowse
                                            • 185.199.111.133
                                            Setup.exeGet hashmaliciousAveMaria, Clipboard Hijacker, StormKittyBrowse
                                            • 185.199.108.133
                                            Setup.exeGet hashmaliciousAveMaria, Clipboard Hijacker, StormKittyBrowse
                                            • 185.199.110.133
                                            reset.exeGet hashmaliciousAveMaria, Clipboard Hijacker, StormKittyBrowse
                                            • 185.199.111.133
                                            StormKittyBuild (3).exeGet hashmaliciousAveMaria, Clipboard Hijacker, StormKittyBrowse
                                            • 185.199.111.133
                                            tools.l.google.comcapt1cha.exeGet hashmaliciousUnknownBrowse
                                            • 142.250.185.174
                                            https://starkiss.hu/Get hashmaliciousUnknownBrowse
                                            • 142.250.181.238
                                            https://evening-ivy-save.glitch.me/Get hashmaliciousUnknownBrowse
                                            • 142.250.184.238
                                            https://chromeenterprise.google/download/Get hashmaliciousUnknownBrowse
                                            • 216.58.212.142
                                            index.htmlGet hashmaliciousUnknownBrowse
                                            • 172.217.168.46
                                            http://heraldoffers.comGet hashmaliciousUnknownBrowse
                                            • 142.250.184.238
                                            Circular_no_088_Annexure_pdf.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 142.250.186.78
                                            RTGS_UCB_DCCB_docx.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 142.250.185.110
                                            https://apps.twc.texas.gov/UITAXSERV/security/logon.doGet hashmaliciousUnknownBrowse
                                            • 142.250.185.78
                                            Gestion-IMMO juillet (4) (1).pdfGet hashmaliciousUnknownBrowse
                                            • 142.250.184.206
                                            ipwhois.appcapt1cha.exeGet hashmaliciousUnknownBrowse
                                            • 195.201.57.90
                                            NrFs9S2x5P.vbsGet hashmaliciousMoDiRATBrowse
                                            • 195.201.57.90
                                            4GkyooSSU6.vbsGet hashmaliciousMoDiRATBrowse
                                            • 195.201.57.90
                                            8FPbFaueUE.vbsGet hashmaliciousMoDiRATBrowse
                                            • 195.201.57.90
                                            PBuqd1KwaW.vbsGet hashmaliciousMoDiRATBrowse
                                            • 195.201.57.90
                                            GN69N6xL96.vbsGet hashmaliciousMoDiRATBrowse
                                            • 195.201.57.90
                                            Irdff95nUE.exeGet hashmaliciousMoDiRATBrowse
                                            • 195.201.57.90
                                            Irdff95nUE.exeGet hashmaliciousMoDiRATBrowse
                                            • 195.201.57.90
                                            captcha.exeGet hashmaliciousPRYSMAX STEALERBrowse
                                            • 195.201.57.90
                                            SecuriteInfo.com.Win64.MalwareX-gen.24714.14996.exeGet hashmaliciousUnknownBrowse
                                            • 195.201.57.90
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            HETZNER-ASDESecuriteInfo.com.Win32.AdwareX-gen.20631.18363.exeGet hashmaliciousVidarBrowse
                                            • 95.217.27.252
                                            file.exeGet hashmaliciousVidarBrowse
                                            • 95.217.27.252
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 88.198.246.242
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 88.198.246.242
                                            LtCPevm69G.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Poverty Stealer, PureLog Stealer, Stealc, VidarBrowse
                                            • 95.217.27.252
                                            NEW ORDER (PO. 2100002 (BT-INC).xlsGet hashmaliciousUnknownBrowse
                                            • 5.161.200.29
                                            New Order.xlsGet hashmaliciousUnknownBrowse
                                            • 5.161.200.29
                                            Purchase Order.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 5.161.200.29
                                            Purchase Order.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 5.161.200.29
                                            Doc9078786968795776764567.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 5.161.200.29
                                            FASTLYUShttp://lploverar.bestGet hashmaliciousUnknownBrowse
                                            • 151.101.1.74
                                            https://securefile395.outgrow.us/securefile395-9Get hashmaliciousHTMLPhisherBrowse
                                            • 151.101.194.208
                                            https://aa1selfstorage.com/ioeloro/?wptouch_switch=mobile&redirect=//gamma.app/docs/Untitled-fw6wys6ubo63z1u?mode=present#card-wdvd2twm5f65uwlGet hashmaliciousUnknownBrowse
                                            • 151.101.2.217
                                            https://aa1selfstorage.com/ioeloro/?wptouch_switch=mobile&redirect=//gamma.app/docs/Untitled-fw6wys6ubo63z1u?mode=present#card-wdvd2twm5f65uwlGet hashmaliciousUnknownBrowse
                                            • 151.101.130.217
                                            https://aa1selfstorage.com/ioeloro/?wptouch_switch=mobile&redirect=//gamma.app/docs/Untitled-fw6wys6ubo63z1u?mode=present#card-wdvd2twm5f65uwlGet hashmaliciousUnknownBrowse
                                            • 151.101.130.217
                                            https://www.gruzoved.com/blog/post/eshe-dve-dorogi-zakryli-na-sahaline-iz-za-nepogody/?next=https%3A%2F%2Fgamma.app%2Fdocs%2Fmeyertrucks-Trust-Meyer-Trucks-diesel-truck-bus-parts-q218q3p16jcbi7h%3Fmode%3Dpresent%23card-5kvf1fu5246tolrGet hashmaliciousGabagoolBrowse
                                            • 151.101.2.217
                                            https://www.gruzoved.com/blog/post/eshe-dve-dorogi-zakryli-na-sahaline-iz-za-nepogody/?next=https%3A%2F%2Fgamma.app%2Fdocs%2Fmeyertrucks-Trust-Meyer-Trucks-diesel-truck-bus-parts-q218q3p16jcbi7h%3Fmode%3Dpresent%23card-5kvf1fu5246tolrGet hashmaliciousUnknownBrowse
                                            • 151.101.2.217
                                            Lead.Upload.Report.Feb.2025.exeGet hashmaliciousUnknownBrowse
                                            • 185.199.108.153
                                            NEW__Review_202591760.svgGet hashmaliciousInvisible JSBrowse
                                            • 151.101.2.137
                                            ADFoyxP.exeGet hashmaliciousUnknownBrowse
                                            • 151.101.129.44
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0epkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            5aQpYG37db.exeGet hashmaliciousAgentTeslaBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            fls3eql72b.exeGet hashmaliciousAgentTeslaBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            letsVPN.exeGet hashmaliciousUnknownBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            letsVPN.exeGet hashmaliciousUnknownBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            SuryetexOrder_PO2025306.pdf.lnkGet hashmaliciousBatch Injector, XWormBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            Shipment advice H-BL Draft.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            Damage Picture 2.vbsGet hashmaliciousAsyncRAT, Batch Injector, VenomRATBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            Solara.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                            • 185.199.109.133
                                            • 195.201.57.90
                                            No context
                                            Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):280
                                            Entropy (8bit):4.132041621771752
                                            Encrypted:false
                                            SSDEEP:3:FiWWltlApdeXKeQwFMYLAfJrAazlYBVP/Sh/JzvPWVcRVEVg3WWD54llt:o1ApdeaEqYsMazlYBVsJDu2ziy54/
                                            MD5:BD72B24D3506282E86F2DE573239D060
                                            SHA1:6E1A396615B8BCE53E24C9C64BA63C194325EB59
                                            SHA-256:1018F6A3BA584F39BACB39A5F83372F0D50274DAE10B189C03F16E23EF02EF72
                                            SHA-512:1AD4F2DC7ABA21C13202B5E2CFCDF88D6AE5AB139CD1A8956370E9D61D2129F49CD6C905CDBA82AC8075815B1656487BC4F41A3985BB0053FD85302B16826F0E
                                            Malicious:false
                                            Preview:sdPC......................X..<EE..r/y..."pZLhTaJ23hN5uQxwzu0K2CYes/dvJuE93VbIVV/LnRA="..................................................................................47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=....................fdb35e9f-12f5-40d5-8d50-87a9333d43a4............
                                            Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            File Type:ASCII text
                                            Category:modified
                                            Size (bytes):59
                                            Entropy (8bit):4.205766829539002
                                            Encrypted:false
                                            SSDEEP:3:Ky2KSuyah4tIR02X:tt5ZV
                                            MD5:4EAFF69CBD424B23D9CA507214F8F946
                                            SHA1:3D7976EC7DECBBB2DA0788BC6986CFB5EEBA3F50
                                            SHA-256:8FE3AE29FA0EEEA600E93BBD33739124721D82915EEDD45222885329B1D605CD
                                            SHA-512:5D34281B2800165C0A96F51E73659E4A74B5166379459839406F735EC7B89EF17D50B788FDDDE9C7A2013AA6CA20C84B0128346571CCC9A55C3177D2AB76C735
                                            Malicious:false
                                            Preview:8993./devtools/browser/d44e7434-e585-4e40-9e5d-65bb6662ed22
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):155648
                                            Entropy (8bit):0.5407252242845243
                                            Encrypted:false
                                            SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                            MD5:7B955D976803304F2C0505431A0CF1CF
                                            SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                            SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                            SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                            Malicious:false
                                            Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3046000, file counter 2, database pages 41, 1st free page 29, free pages 1, cookie 0x25, schema 4, UTF-8, version-valid-for 2
                                            Category:dropped
                                            Size (bytes):196608
                                            Entropy (8bit):0.45909911068154247
                                            Encrypted:false
                                            SSDEEP:96:OpdTxQ+ALqL/uejzH+bF+UIYysX0lj/twfLyl0e9S8E:OpdT7IqL/tH+bF+UI3i67Kylj9
                                            MD5:89783266A93C429FCFB9CE049053FCCD
                                            SHA1:AC70D1404CB8588DBB685165154CA6FD01942CCE
                                            SHA-256:AF2420C3F982037DA346ACB0722E54A466547DCCFC54C44EA84FBC1401DC15BC
                                            SHA-512:BD3C480D62EDF9CA8F23BB17E39405E9EE2EE705EEE832F738D4C3AE5C16E3317A1822C07373CB49A8E704B3DA3D7BDC95544208C1C369322E7F8CE2E2DE93CF
                                            Malicious:false
                                            Preview:SQLite format 3......@ .......)...........%......................................................zp....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
                                            Category:dropped
                                            Size (bytes):40960
                                            Entropy (8bit):0.8616778647394084
                                            Encrypted:false
                                            SSDEEP:48:pMtA+IIkCVEq8Ma0D0HOlf/6ykwpLf/UUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:pOCCn8MouB6w9f/MiZqmvJKLPeymwil
                                            MD5:BDDE4AD11E732420E7ABCCA946B11611
                                            SHA1:278C3386A37BAFCA507CF4C128600B01B312DDA0
                                            SHA-256:099AB6B902097361832FC2485E96C71C827E722FA74C09C7D08DCE9091094C1D
                                            SHA-512:B29061A507FCAE2CB56155C5C911706E60C798D288968B210A1670C0F0D1D3F7B3B2B2919B946FED47C4975B157A56B557F71AE80A427C85C660F6B37153C9E8
                                            Malicious:false
                                            Preview:SQLite format 3......@ ..........................................................................zp....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):51200
                                            Entropy (8bit):0.8746135976761988
                                            Encrypted:false
                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                            Malicious:false
                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
                                            Category:dropped
                                            Size (bytes):139264
                                            Entropy (8bit):1.1357727439169438
                                            Encrypted:false
                                            SSDEEP:192:ulsfoVZkNi61n1ulH5LpX60pjjrVuHnPqfPk:ulsfoQx1n1ulH5lNpvrVuHnPqfM
                                            MD5:4000172BFE82B4E6FB8F9462E4331DD8
                                            SHA1:D002133B638550C67E05D3712B8490737121AC85
                                            SHA-256:9D3F547662D67FF17A1943CA5FD55CD6E680968319ACD8FA0D9040B000833D98
                                            SHA-512:B8D1331D5E306E80C6B0F8B9C3A29F507F9EAA2BFAD9DC59D77F10E63971CB038ED28228873F8B04FCAE2AC05FE401637EB0745DD3F27814B921167743BE8CD9
                                            Malicious:false
                                            Preview:SQLite format 3......@ .......D...........J......................................................zp...........<........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 9
                                            Category:dropped
                                            Size (bytes):196608
                                            Entropy (8bit):1.1213059433085482
                                            Encrypted:false
                                            SSDEEP:384:KdM2qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:Kvq+n0E9ELyKOMq+8y9/Ow
                                            MD5:52AEDF324F11D74BC4F73AEF0E23C283
                                            SHA1:DEA533B547EABC60188397B8246E7FD5985E2D74
                                            SHA-256:8724C6792B6F4274CD459138FBCCE1C8BBB38A3D4DBF6508A5E0C5314BC01730
                                            SHA-512:5058C8351FBACEB3136978BC415A810ED2CEF5BA00B1342DEC6FDDFC8E9A301DBC775BA6EB5544E323003BA50F7B26BE95B48A3224616E0C7C896D3550E3BF34
                                            Malicious:false
                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):99
                                            Entropy (8bit):4.81064582729524
                                            Encrypted:false
                                            SSDEEP:3:y2MKJCJMyPfRUWsCISuyah4tIR02in:fYMyRUeI5Zs
                                            MD5:161B4EEDBEFB2BA69CDC9488455DCFBD
                                            SHA1:3532375E4EEFC07C5878CC63AF02D1D94EFCEEF6
                                            SHA-256:3A617F5A41D7DD8B298057C270590D70CEF1375EFE189B9F930B103F58D75B5D
                                            SHA-512:E5CE47AE2DDA912638EAB3D7F67B4D881D4BF35E0CA265E798E9A0A1699F49E1F188556536C9348E28E9E863D32F205D75AA961A7EA658507DD9FE40CCA21EE8
                                            Malicious:false
                                            Preview:..DevTools listening on ws://127.0.0.1:8993/devtools/browser/d44e7434-e585-4e40-9e5d-65bb6662ed22..
                                            File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                            Entropy (8bit):6.3812140730282465
                                            TrID:
                                            • Win64 Executable (generic) (12005/4) 74.95%
                                            • Generic Win/DOS Executable (2004/3) 12.51%
                                            • DOS Executable Generic (2002/1) 12.50%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                            File name:SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            File size:6'332'737 bytes
                                            MD5:06ee2174e93d7559b745655790d2d060
                                            SHA1:c751b6482675a1f1676decec961a1cce34e3971c
                                            SHA256:ab3b34448f6154ef6edbe6d90a1ed98eec54704d048055951602dae3729eb2cf
                                            SHA512:c16c0f3e00c69e9d996bd6332685d42d09b9bb96f1d847dd4cec5be4edd5a561cd3210bd42133827d6cff79b49833ab381421a06b0642e213d2d58f7df2176d1
                                            SSDEEP:98304:4SZNBiD2hif7gODOthNLOOzgaVcU3LizAVRRPHvGQfy6xC+K:3Fj5OsgaxLI
                                            TLSH:C9568C03FAE55DEDCDAAC1388A9B9332A735BD458532E7571B64CA222D13BD1AF4C304
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Q/.g..F..~....&....)../...F................@............................. G.....5.a...`... ............................
                                            Icon Hash:90cececece8e8eb0
                                            Entrypoint:0x1400013e0
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x140000000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x67BA2F51 [Sat Feb 22 20:10:57 2025 UTC]
                                            TLS Callbacks:0x401a4f60, 0x1, 0x4020b830, 0x1, 0x4020b800, 0x1
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:65428cc2268dc10a7afc761c7099d905
                                            Instruction
                                            push ebp
                                            dec eax
                                            mov ebp, esp
                                            dec eax
                                            sub esp, 20h
                                            dec eax
                                            mov eax, dword ptr [00406BA1h]
                                            mov dword ptr [eax], 00000001h
                                            call 00007F64790A9A9Bh
                                            nop
                                            nop
                                            dec eax
                                            add esp, 20h
                                            pop ebp
                                            ret
                                            nop word ptr [eax+eax+00000000h]
                                            nop dword ptr [eax]
                                            push ebp
                                            dec eax
                                            mov ebp, esp
                                            dec eax
                                            sub esp, 20h
                                            dec eax
                                            mov eax, dword ptr [00406B71h]
                                            mov dword ptr [eax], 00000000h
                                            call 00007F64790A9A6Bh
                                            nop
                                            nop
                                            dec eax
                                            add esp, 20h
                                            pop ebp
                                            ret
                                            nop word ptr [eax+eax+00000000h]
                                            nop dword ptr [eax]
                                            push ebp
                                            dec eax
                                            mov ebp, esp
                                            dec eax
                                            sub esp, 20h
                                            call 00007F64792B32C0h
                                            dec eax
                                            cmp eax, 01h
                                            sbb eax, eax
                                            dec eax
                                            add esp, 20h
                                            pop ebp
                                            ret
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            dec eax
                                            lea ecx, dword ptr [00000009h]
                                            jmp 00007F64790A9CD9h
                                            nop dword ptr [eax+00h]
                                            ret
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            inc ecx
                                            push esi
                                            push esi
                                            push edi
                                            push ebx
                                            dec eax
                                            sub esp, 58h
                                            dec eax
                                            mov eax, edx
                                            dec eax
                                            mov esi, ecx
                                            dec eax
                                            mov ecx, dword ptr [edx]
                                            dec eax
                                            mov edx, dword ptr [edx+08h]
                                            test byte ptr [edx], 00000001h
                                            je 00007F64790A9D0Ch
                                            dec eax
                                            mov edx, dword ptr [edx+10h]
                                            dec eax
                                            add edx, 30h
                                            jmp 00007F64790A9D06h
                                            dec eax
                                            mov edx, dword ptr [edx+00h]
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x4640000x3074.idata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4150000x17640.pdata
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x46a0000x7640.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x407bc00x28.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x464b800x9d8.idata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x2fb9580x2fba000a7e98af4abac48cc561d4d916662c31unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .data0x2fd0000x4f800x500071699b3f696abdde6cfcb9f9d866208dFalse0.245703125data2.84982672878983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rdata0x3020000x1123d00x112400f28d38fdd1b8b139746929367fb73282False0.40278796575888787data5.607391926039962IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .pdata0x4150000x176400x17800dffec79d098a8215ecb3115821f0dd9fFalse0.4959690824468085data6.361943657167841IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .xdata0x42d0000x35e700x360000294c439be96e29942c3252597879aedFalse0.4007523148148148data5.671705185623759IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .bss0x4630000x3200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .idata0x4640000x30740x32003a5ee6b9bdc6615d79a16afc62b002afFalse0.262109375data4.245824882011249IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .CRT0x4680000x680x2000c7d3e242e08bb3ce1813c675c8fdcf4False0.07421875data0.3826718640819857IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .tls0x4690000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .reloc0x46a0000x76400x780089404ca6d528f749fe2d29e1c146bbcbFalse0.25634765625data5.4497009413089845IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            DLLImport
                                            advapi32.dllCopySid, GetLengthSid, GetTokenInformation, IsValidSid, LookupAccountSidW, OpenProcessToken, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, SystemFunction036
                                            bcrypt.dllBCryptGenRandom
                                            crypt32.dllCertAddCertificateContextToStore, CertCloseStore, CertDuplicateCertificateChain, CertDuplicateCertificateContext, CertDuplicateStore, CertEnumCertificatesInStore, CertFreeCertificateChain, CertFreeCertificateContext, CertGetCertificateChain, CertOpenStore, CertVerifyCertificateChainPolicy, CryptUnprotectData
                                            iphlpapi.dllFreeMibTable, GetAdaptersAddresses, GetIfEntry2, GetIfTable2
                                            kernel32.dllAddVectoredExceptionHandler, AreFileApisANSI, CancelIo, CloseHandle, CompareStringOrdinal, CopyFileExW, CreateDirectoryW, CreateEventW, CreateFileA, CreateFileMappingA, CreateFileMappingW, CreateFileW, CreateIoCompletionPort, CreateMutexW, CreateNamedPipeW, CreateProcessW, CreateThread, CreateToolhelp32Snapshot, CreateWaitableTimerExW, DeleteCriticalSection, DeleteFileA, DeleteFileW, DeleteProcThreadAttributeList, DeviceIoControl, DuplicateHandle, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FlushViewOfFile, FormatMessageA, FormatMessageW, FreeEnvironmentStringsW, FreeLibrary, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDiskFreeSpaceA, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetDriveTypeW, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesA, GetFileAttributesExW, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileSize, GetFinalPathNameByHandleW, GetFullPathNameA, GetFullPathNameW, GetLastError, GetLogicalDrives, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetProcessIoCounters, GetProcessTimes, GetQueuedCompletionStatusEx, GetStdHandle, GetSystemDirectoryW, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetSystemTimePreciseAsFileTime, GetSystemTimes, GetTempPathA, GetTempPathW, GetTickCount, GetTickCount64, GetVolumeInformationW, GetWindowsDirectoryW, GlobalMemoryStatusEx, HeapAlloc, HeapCompact, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSize, HeapValidate, InitOnceBeginInitialize, InitOnceComplete, InitializeCriticalSection, InitializeProcThreadAttributeList, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFree, LockFile, LockFileEx, MapViewOfFile, Module32FirstW, Module32NextW, MultiByteToWideChar, OpenProcess, OutputDebugStringA, OutputDebugStringW, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, ReadFile, ReadFileEx, ReadProcessMemory, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetEndOfFile, SetFileCompletionNotificationModes, SetFileInformationByHandle, SetFilePointer, SetFilePointerEx, SetHandleInformation, SetLastError, SetThreadStackGuarantee, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SleepEx, SwitchToThread, SystemTimeToFileTime, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnlockFile, UnlockFileEx, UnmapViewOfFile, UpdateProcThreadAttribute, VirtualQueryEx, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteFileEx, lstrlenW
                                            netapi32.dllNetApiBufferFree, NetUserEnum, NetUserGetInfo, NetUserGetLocalGroups
                                            ntdll.dllNtCancelIoFileEx, NtCreateFile, NtDeviceIoControlFile, NtQueryInformationProcess, NtQuerySystemInformation, NtReadFile, NtWriteFile, RtlGetVersion, RtlNtStatusToDosError
                                            ole32.dllCoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, CoTaskMemFree, CoUninitialize
                                            oleaut32.dllSysAllocString, SysFreeString, VariantClear
                                            pdh.dllPdhAddEnglishCounterW, PdhCloseQuery, PdhCollectQueryData, PdhGetFormattedCounterValue, PdhOpenQueryA, PdhRemoveCounter
                                            powrprof.dllCallNtPowerInformation
                                            psapi.dllGetModuleFileNameExW, GetPerformanceInfo
                                            secur32.dllAcceptSecurityContext, AcquireCredentialsHandleA, ApplyControlToken, DecryptMessage, DeleteSecurityContext, EncryptMessage, FreeContextBuffer, FreeCredentialsHandle, InitializeSecurityContextW, LsaEnumerateLogonSessions, LsaFreeReturnBuffer, LsaGetLogonSessionData, QueryContextAttributesW
                                            shell32.dllCommandLineToArgvW, SHGetKnownFolderPath
                                            user32.dllGetSystemMetrics, SystemParametersInfoW
                                            ws2_32.dllWSACleanup, WSAGetLastError, WSAIoctl, WSASend, WSASocketW, WSAStartup, bind, closesocket, connect, freeaddrinfo, getaddrinfo, getpeername, getsockname, getsockopt, ioctlsocket, listen, recv, send, setsockopt, shutdown, socket
                                            api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
                                            bcryptprimitives.dllProcessPrng
                                            KERNEL32.dllRaiseException, RtlUnwindEx, VirtualProtect, VirtualQuery, __C_specific_handler
                                            msvcrt.dll__getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _fpreset, _initterm, _localtime64, _onexit, abort, calloc, exit, fprintf, free, fwrite, log, malloc, memcmp, memcpy, memmove, memset, pow, qsort, realloc, signal, strcmp, strcspn, strlen, strncmp, strrchr, vfprintf, wcslen
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 7, 2025 20:45:34.959806919 CET49676443192.168.2.520.189.173.14
                                            Mar 7, 2025 20:45:35.271172047 CET49676443192.168.2.520.189.173.14
                                            Mar 7, 2025 20:45:35.880454063 CET49676443192.168.2.520.189.173.14
                                            Mar 7, 2025 20:45:35.927506924 CET49672443192.168.2.5204.79.197.203
                                            Mar 7, 2025 20:45:37.083616018 CET49676443192.168.2.520.189.173.14
                                            Mar 7, 2025 20:45:38.605846882 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:38.605885029 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:38.605953932 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:38.617101908 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:38.617125988 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:39.489886045 CET49676443192.168.2.520.189.173.14
                                            Mar 7, 2025 20:45:40.218122005 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:40.218225002 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:40.373987913 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:40.374028921 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:40.374496937 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:40.427503109 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:41.176642895 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:41.224337101 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:41.714472055 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:41.714633942 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:41.714679956 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:41.783473969 CET49695443192.168.2.5185.199.109.133
                                            Mar 7, 2025 20:45:41.783513069 CET44349695185.199.109.133192.168.2.5
                                            Mar 7, 2025 20:45:44.300277948 CET49676443192.168.2.520.189.173.14
                                            Mar 7, 2025 20:45:45.534764051 CET49672443192.168.2.5204.79.197.203
                                            Mar 7, 2025 20:45:53.918606997 CET49676443192.168.2.520.189.173.14
                                            Mar 7, 2025 20:45:55.577352047 CET49675443192.168.2.52.23.227.208
                                            Mar 7, 2025 20:45:55.577411890 CET443496752.23.227.208192.168.2.5
                                            Mar 7, 2025 20:46:18.375919104 CET49712443192.168.2.5142.250.186.68
                                            Mar 7, 2025 20:46:18.375967026 CET44349712142.250.186.68192.168.2.5
                                            Mar 7, 2025 20:46:18.376024008 CET49712443192.168.2.5142.250.186.68
                                            Mar 7, 2025 20:46:18.376471043 CET49712443192.168.2.5142.250.186.68
                                            Mar 7, 2025 20:46:18.376487017 CET44349712142.250.186.68192.168.2.5
                                            Mar 7, 2025 20:46:20.339791059 CET44349712142.250.186.68192.168.2.5
                                            Mar 7, 2025 20:46:20.389276981 CET49712443192.168.2.5142.250.186.68
                                            Mar 7, 2025 20:46:20.676258087 CET49712443192.168.2.5142.250.186.68
                                            Mar 7, 2025 20:46:23.864387035 CET49684443192.168.2.52.23.227.208
                                            Mar 7, 2025 20:46:24.326586008 CET804968784.201.210.23192.168.2.5
                                            Mar 7, 2025 20:46:24.328224897 CET4968780192.168.2.584.201.210.23
                                            Mar 7, 2025 20:46:24.328224897 CET4968780192.168.2.584.201.210.23
                                            Mar 7, 2025 20:46:24.333225965 CET804968784.201.210.23192.168.2.5
                                            Mar 7, 2025 20:46:26.223848104 CET804968884.201.210.23192.168.2.5
                                            Mar 7, 2025 20:46:26.223994970 CET4968880192.168.2.584.201.210.23
                                            Mar 7, 2025 20:46:26.224035978 CET4968880192.168.2.584.201.210.23
                                            Mar 7, 2025 20:46:26.229351044 CET804968884.201.210.23192.168.2.5
                                            Mar 7, 2025 20:46:29.002923965 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:29.002958059 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:29.007111073 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:29.007111073 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:29.007142067 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:31.738723040 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:31.738814116 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:31.740691900 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:31.740705013 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:31.740931034 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:31.742090940 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:31.788322926 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:32.174896002 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:32.228555918 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:32.228580952 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:32.229049921 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:32.229067087 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:32.229140997 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:32.229317904 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:32.229353905 CET44349714195.201.57.90192.168.2.5
                                            Mar 7, 2025 20:46:32.229867935 CET49714443192.168.2.5195.201.57.90
                                            Mar 7, 2025 20:46:32.229887962 CET49714443192.168.2.5195.201.57.90
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 7, 2025 20:45:38.593806982 CET5715753192.168.2.51.1.1.1
                                            Mar 7, 2025 20:45:38.601006031 CET53571571.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:13.980956078 CET5705353192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:13.981105089 CET5783153192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:13.990112066 CET53562091.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:13.990124941 CET53570531.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:13.991724014 CET53578311.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:14.039964914 CET53639421.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:14.989680052 CET5541253192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:14.989865065 CET5484853192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:14.996715069 CET53554121.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:15.000598907 CET53548481.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:16.001559973 CET6032253192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:16.001732111 CET6245753192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:16.008784056 CET53603221.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:16.009006023 CET53624571.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:18.026614904 CET4994553192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:18.033946037 CET53499451.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:18.246093035 CET6319353192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:18.246309042 CET6511853192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:18.253176928 CET53631931.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:18.266685009 CET53651181.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:18.367439985 CET5430253192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:18.367630005 CET5064253192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:18.374684095 CET53543021.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:18.374699116 CET53506421.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:18.508749962 CET53503241.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:19.029604912 CET4994553192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:19.037008047 CET53499451.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:19.262298107 CET5271953192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:19.262604952 CET5904253192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:19.269248009 CET53527191.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:19.302011013 CET53590421.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:20.040786028 CET4994553192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:20.048156023 CET53499451.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:22.047463894 CET4994553192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:22.054692984 CET53499451.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:26.053781033 CET4994553192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:26.061081886 CET53499451.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:28.993331909 CET5701353192.168.2.51.1.1.1
                                            Mar 7, 2025 20:46:29.001328945 CET53570131.1.1.1192.168.2.5
                                            Mar 7, 2025 20:46:38.234641075 CET138138192.168.2.5192.168.2.255
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Mar 7, 2025 20:45:38.593806982 CET192.168.2.51.1.1.10x79a7Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:13.980956078 CET192.168.2.51.1.1.10x2191Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:13.981105089 CET192.168.2.51.1.1.10xb192Standard query (0)tools.google.com65IN (0x0001)false
                                            Mar 7, 2025 20:46:14.989680052 CET192.168.2.51.1.1.10x61a1Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:14.989865065 CET192.168.2.51.1.1.10x9d02Standard query (0)tools.google.com65IN (0x0001)false
                                            Mar 7, 2025 20:46:16.001559973 CET192.168.2.51.1.1.10x5fa3Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:16.001732111 CET192.168.2.51.1.1.10x938eStandard query (0)tools.google.com65IN (0x0001)false
                                            Mar 7, 2025 20:46:18.026614904 CET192.168.2.51.1.1.10x1c97Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.246093035 CET192.168.2.51.1.1.10x6d0bStandard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.246309042 CET192.168.2.51.1.1.10x8533Standard query (0)tools.google.com65IN (0x0001)false
                                            Mar 7, 2025 20:46:18.367439985 CET192.168.2.51.1.1.10x7efStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.367630005 CET192.168.2.51.1.1.10xc4b0Standard query (0)www.google.com65IN (0x0001)false
                                            Mar 7, 2025 20:46:19.029604912 CET192.168.2.51.1.1.10x1c97Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:19.262298107 CET192.168.2.51.1.1.10x5276Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:19.262604952 CET192.168.2.51.1.1.10x10e7Standard query (0)tools.google.com65IN (0x0001)false
                                            Mar 7, 2025 20:46:20.040786028 CET192.168.2.51.1.1.10x1c97Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:22.047463894 CET192.168.2.51.1.1.10x1c97Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:26.053781033 CET192.168.2.51.1.1.10x1c97Standard query (0)tools.google.comA (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:28.993331909 CET192.168.2.51.1.1.10xb6b5Standard query (0)ipwhois.appA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Mar 7, 2025 20:45:38.601006031 CET1.1.1.1192.168.2.50x79a7No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:45:38.601006031 CET1.1.1.1192.168.2.50x79a7No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:45:38.601006031 CET1.1.1.1192.168.2.50x79a7No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:45:38.601006031 CET1.1.1.1192.168.2.50x79a7No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:13.990124941 CET1.1.1.1192.168.2.50x2191No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:13.990124941 CET1.1.1.1192.168.2.50x2191No error (0)tools.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:13.991724014 CET1.1.1.1192.168.2.50xb192No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:14.996715069 CET1.1.1.1192.168.2.50x61a1No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:14.996715069 CET1.1.1.1192.168.2.50x61a1No error (0)tools.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:15.000598907 CET1.1.1.1192.168.2.50x9d02No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:16.008784056 CET1.1.1.1192.168.2.50x5fa3No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:16.008784056 CET1.1.1.1192.168.2.50x5fa3No error (0)tools.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:16.009006023 CET1.1.1.1192.168.2.50x938eNo error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.033946037 CET1.1.1.1192.168.2.50x1c97No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.033946037 CET1.1.1.1192.168.2.50x1c97No error (0)tools.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.253176928 CET1.1.1.1192.168.2.50x6d0bNo error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.253176928 CET1.1.1.1192.168.2.50x6d0bNo error (0)tools.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.266685009 CET1.1.1.1192.168.2.50x8533No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.374684095 CET1.1.1.1192.168.2.50x7efNo error (0)www.google.com142.250.186.68A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:18.374699116 CET1.1.1.1192.168.2.50xc4b0No error (0)www.google.com65IN (0x0001)false
                                            Mar 7, 2025 20:46:19.037008047 CET1.1.1.1192.168.2.50x1c97No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:19.037008047 CET1.1.1.1192.168.2.50x1c97No error (0)tools.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:19.269248009 CET1.1.1.1192.168.2.50x5276No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:19.269248009 CET1.1.1.1192.168.2.50x5276No error (0)tools.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:19.302011013 CET1.1.1.1192.168.2.50x10e7No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:20.048156023 CET1.1.1.1192.168.2.50x1c97No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:20.048156023 CET1.1.1.1192.168.2.50x1c97No error (0)tools.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:22.054692984 CET1.1.1.1192.168.2.50x1c97No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:22.054692984 CET1.1.1.1192.168.2.50x1c97No error (0)tools.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:26.061081886 CET1.1.1.1192.168.2.50x1c97No error (0)tools.google.comtools.l.google.comCNAME (Canonical name)IN (0x0001)false
                                            Mar 7, 2025 20:46:26.061081886 CET1.1.1.1192.168.2.50x1c97No error (0)tools.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                            Mar 7, 2025 20:46:29.001328945 CET1.1.1.1192.168.2.50xb6b5No error (0)ipwhois.app195.201.57.90A (IP address)IN (0x0001)false
                                            • raw.githubusercontent.com
                                            • ipwhois.app
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.549695185.199.109.1334438516C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            TimestampBytes transferredDirectionData
                                            2025-03-07 19:45:41 UTC113OUTGET /cepitalove/age-of-empires-pro-hack/main/README.md HTTP/1.1
                                            accept: */*
                                            host: raw.githubusercontent.com
                                            2025-03-07 19:45:41 UTC896INHTTP/1.1 200 OK
                                            Connection: close
                                            Content-Length: 22
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "dd768f65aef8f5419ae240b502b3520792e41e4d601755e6328e7809d50e077b"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 1D62:881C9:8F5702:AD9A31:67CB4329
                                            Accept-Ranges: bytes
                                            Date: Fri, 07 Mar 2025 19:45:41 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-ewr-kewr1740041-EWR
                                            X-Cache: HIT
                                            X-Cache-Hits: 0
                                            X-Timer: S1741376741.357952,VS0,VE48
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 34dd372e133d2a6999f766fd3eafd78f2bf9fa34
                                            Expires: Fri, 07 Mar 2025 19:50:41 GMT
                                            Source-Age: 0
                                            2025-03-07 19:45:41 UTC22INData Raw: 63 61 74 73 2e 73 74 61 6e 64 61 72 64 73 68 6f 70 2e 78 79 7a 0a
                                            Data Ascii: cats.standardshop.xyz


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.549714195.201.57.904438516C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            TimestampBytes transferredDirectionData
                                            2025-03-07 19:46:31 UTC55OUTGET /json/ HTTP/1.1
                                            accept: */*
                                            host: ipwhois.app
                                            2025-03-07 19:46:32 UTC255INHTTP/1.1 200 OK
                                            Date: Fri, 07 Mar 2025 19:46:31 GMT
                                            Content-Type: application/json; charset=utf-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Server: ipwhois
                                            Access-Control-Allow-Origin: *
                                            Access-Control-Allow-Headers: *
                                            X-Robots-Tag: noindex
                                            2025-03-07 19:46:32 UTC698INData Raw: 32 61 65 0d 0a 7b 22 69 70 22 3a 22 31 30 30 2e 32 2e 31 30 36 2e 32 34 31 22 2c 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 74 79 70 65 22 3a 22 49 50 76 34 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 55 53 22 2c 22 63 6f 75 6e 74 72 79 5f 66 6c 61 67 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 63 64 6e 2e 69 70 77 68 6f 69 73 2e 69 6f 5c 2f 66 6c 61 67 73 5c 2f 75 73 2e 73 76 67 22 2c 22 63 6f 75 6e 74 72 79 5f 63 61 70 69 74 61 6c 22 3a 22 57 61 73 68 69 6e 67 74 6f 6e 20 44 2e 43 2e 22 2c 22 63 6f 75 6e 74 72 79 5f 70
                                            Data Ascii: 2ae{"ip":"100.2.106.241","success":true,"type":"IPv4","continent":"North America","continent_code":"NA","country":"United States","country_code":"US","country_flag":"https:\/\/cdn.ipwhois.io\/flags\/us.svg","country_capital":"Washington D.C.","country_p


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:14:45:37
                                            Start date:07/03/2025
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.14022.11951.exe"
                                            Imagebase:0x7ff7907a0000
                                            File size:6'332'737 bytes
                                            MD5 hash:06EE2174E93D7559B745655790D2D060
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:14:45:41
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:2
                                            Start time:14:45:41
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:14:45:41
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:4
                                            Start time:14:45:41
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:14:45:42
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:6
                                            Start time:14:45:42
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:14:45:43
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:8
                                            Start time:14:45:43
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:14:45:44
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:10
                                            Start time:14:45:44
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:11
                                            Start time:14:45:44
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:12
                                            Start time:14:45:44
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:13
                                            Start time:14:45:45
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:14
                                            Start time:14:45:45
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:15
                                            Start time:14:45:46
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:16
                                            Start time:14:45:47
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:17
                                            Start time:14:45:48
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:18
                                            Start time:14:45:48
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:19
                                            Start time:14:45:48
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:20
                                            Start time:14:45:49
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:21
                                            Start time:14:45:49
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:22
                                            Start time:14:45:49
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:23
                                            Start time:14:45:50
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:24
                                            Start time:14:45:50
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:25
                                            Start time:14:45:50
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:26
                                            Start time:14:45:50
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:27
                                            Start time:14:45:51
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:28
                                            Start time:14:45:51
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:29
                                            Start time:14:45:51
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:30
                                            Start time:14:45:51
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:31
                                            Start time:14:45:52
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist" /FO CSV /NH
                                            Imagebase:0x7ff7e2000000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:32
                                            Start time:14:45:52
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:35
                                            Start time:14:46:10
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\taskkill.exe
                                            Wow64 process (32bit):false
                                            Commandline:"taskkill" /F /IM Discord.exe
                                            Imagebase:0x7ff6fd2a0000
                                            File size:101'376 bytes
                                            MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:36
                                            Start time:14:46:10
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:37
                                            Start time:14:46:11
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist" /FI "IMAGENAME eq msedge.exe"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:38
                                            Start time:14:46:11
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist" /FI "IMAGENAME eq chrome.exe"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:39
                                            Start time:14:46:11
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:40
                                            Start time:14:46:11
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:41
                                            Start time:14:46:11
                                            Start date:07/03/2025
                                            Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless --restore-last-session --remote-debugging-port=8993 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --start-minimized
                                            Imagebase:0x7ff7735a0000
                                            File size:4'210'216 bytes
                                            MD5 hash:69222B8101B0601CC6663F8381E7E00F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:false

                                            Target ID:42
                                            Start time:14:46:11
                                            Start date:07/03/2025
                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --restore-last-session --remote-debugging-port=8335 --remote-allow-origins=* "--user-data-dir=C:\Users\user\AppData\Local\Google\Chrome\User Data" --profile-directory=Default --start-minimized
                                            Imagebase:0x7ff7cac20000
                                            File size:3'388'000 bytes
                                            MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:43
                                            Start time:14:46:12
                                            Start date:07/03/2025
                                            Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1584 --field-trial-handle=1460,i,15420184414412820723,15264307004454752543,262144 --disable-features=PaintHolding /prefetch:3
                                            Imagebase:0x7ff7735a0000
                                            File size:4'210'216 bytes
                                            MD5 hash:69222B8101B0601CC6663F8381E7E00F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:false

                                            Target ID:44
                                            Start time:14:46:12
                                            Start date:07/03/2025
                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2092 /prefetch:3
                                            Imagebase:0x7ff7cac20000
                                            File size:3'388'000 bytes
                                            MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:45
                                            Start time:14:46:15
                                            Start date:07/03/2025
                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Google\Chrome\User Data" --no-pre-read-main-dll --field-trial-handle=2044,i,6586487769325516820,4785869960678757505,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=4664 /prefetch:8
                                            Imagebase:0x7ff7cac20000
                                            File size:3'388'000 bytes
                                            MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:48
                                            Start time:14:46:19
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist" /FI "IMAGENAME eq chrome.exe"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:49
                                            Start time:14:46:19
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:50
                                            Start time:14:46:19
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\taskkill.exe
                                            Wow64 process (32bit):false
                                            Commandline:"taskkill" /F /IM chrome.exe
                                            Imagebase:0x7ff6fd2a0000
                                            File size:101'376 bytes
                                            MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:51
                                            Start time:14:46:19
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:52
                                            Start time:14:46:19
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:53
                                            Start time:14:46:19
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:54
                                            Start time:14:46:20
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:55
                                            Start time:14:46:20
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:56
                                            Start time:14:46:20
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:57
                                            Start time:14:46:20
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:58
                                            Start time:14:46:21
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:59
                                            Start time:14:46:21
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:60
                                            Start time:14:46:22
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff7c3fa0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:61
                                            Start time:14:46:22
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6c9700000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:62
                                            Start time:14:46:22
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:63
                                            Start time:14:46:22
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:64
                                            Start time:14:46:23
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:65
                                            Start time:14:46:23
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:66
                                            Start time:14:46:24
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:67
                                            Start time:14:46:24
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:68
                                            Start time:14:46:24
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:69
                                            Start time:14:46:24
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:70
                                            Start time:14:46:25
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:71
                                            Start time:14:46:25
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:72
                                            Start time:14:46:25
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:73
                                            Start time:14:46:25
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:74
                                            Start time:14:46:26
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:75
                                            Start time:14:46:26
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:76
                                            Start time:14:46:27
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:77
                                            Start time:14:46:27
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:78
                                            Start time:14:46:27
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\tasklist.exe
                                            Wow64 process (32bit):false
                                            Commandline:"tasklist"
                                            Imagebase:0x7ff648cc0000
                                            File size:106'496 bytes
                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:79
                                            Start time:14:46:27
                                            Start date:07/03/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7e2000000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            No disassembly