Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Revised PI_2024.exe

Overview

General Information

Sample name:Revised PI_2024.exe
Analysis ID:1476760
MD5:3a78393aeba62548f630b8db173b21fc
SHA1:ef48bee35127d470f759f7e4c0c23852ef4d360c
SHA256:e95df2cc1ac0d157ac28cec5b9ec404298d65bff11c6da736072a394dd541f79
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to register a low level keyboard hook
Installs a global keyboard hook
Mass process execution to delay analysis
Obfuscated command line found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • Revised PI_2024.exe (PID: 3500 cmdline: "C:\Users\user\Desktop\Revised PI_2024.exe" MD5: 3A78393AEBA62548F630B8DB173B21FC)
    • cmd.exe (PID: 6828 cmdline: cmd.exe /c set /a "250^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3568 cmdline: cmd.exe /c set /a "244^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4828 cmdline: cmd.exe /c set /a "227^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5552 cmdline: cmd.exe /c set /a "255^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4884 cmdline: cmd.exe /c set /a "244^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6708 cmdline: cmd.exe /c set /a "253^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5560 cmdline: cmd.exe /c set /a "130^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6900 cmdline: cmd.exe /c set /a "131^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 8032 cmdline: cmd.exe /c set /a "139^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6204 cmdline: cmd.exe /c set /a "139^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7048 cmdline: cmd.exe /c set /a "242^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7636 cmdline: cmd.exe /c set /a "195^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7652 cmdline: cmd.exe /c set /a "212^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7612 cmdline: cmd.exe /c set /a "208^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1836 cmdline: cmd.exe /c set /a "197^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5792 cmdline: cmd.exe /c set /a "212^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6084 cmdline: cmd.exe /c set /a "247^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7076 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5556 cmdline: cmd.exe /c set /a "221^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5036 cmdline: cmd.exe /c set /a "212^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1100 cmdline: cmd.exe /c set /a "240^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6744 cmdline: cmd.exe /c set /a "153^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4360 cmdline: cmd.exe /c set /a "220^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6388 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5552 cmdline: cmd.exe /c set /a "195^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6708 cmdline: cmd.exe /c set /a "133^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 964 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1484 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3960 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3284 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5204 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4800 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5332 cmdline: cmd.exe /c set /a "201^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1596 cmdline: cmd.exe /c set /a "137^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2304 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4704 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7612 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1492 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6772 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7560 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6540 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6708 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5348 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2784 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2304 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3064 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7312 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6544 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7828 cmdline: cmd.exe /c set /a "193^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1956 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6456 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6624 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6744 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6388 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5560 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4120 cmdline: cmd.exe /c set /a "133^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1756 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1596 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4244 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2304 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 8092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3064 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1740 cmdline: cmd.exe /c set /a "201^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6604 cmdline: cmd.exe /c set /a "137^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1484 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • Revised PI_2024.exe (PID: 7700 cmdline: "C:\Users\user\Desktop\Revised PI_2024.exe" MD5: 3A78393AEBA62548F630B8DB173B21FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.25860616069.00000000005D7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
    00000000.00000002.25860616069.0000000000604000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      00000083.00000002.30448881456.0000000036601000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.25861827661.00000000047F5000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Revised PI_2024.exe PID: 3500JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Revised PI_2024.exeReversingLabs: Detection: 28%
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0011EC68 CryptUnprotectData,131_2_0011EC68
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0011F648 CryptUnprotectData,131_2_0011F648
            Source: Revised PI_2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 142.250.217.110:443 -> 192.168.11.20:49771 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.69.193:443 -> 192.168.11.20:49772 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.20:49773 version: TLS 1.2
            Source: Revised PI_2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405EA8 FindFirstFileA,FindClose,0_2_00405EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00402645 FindFirstFileA,131_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,131_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405EA8 FindFirstFileA,FindClose,131_2_00405EA8
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: Revised PI_2024.exe, Revised PI_2024.exe, 00000083.00000000.25750416365.0000000000409000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: Revised PI_2024.exe, 00000000.00000000.25343490775.0000000000409000.00000008.00000001.01000000.00000003.sdmp, Revised PI_2024.exe, 00000000.00000002.25860296580.0000000000409000.00000004.00000001.01000000.00000003.sdmp, Revised PI_2024.exe, 00000083.00000000.25750416365.0000000000409000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Revised PI_2024.exe, 00000083.00000002.30448881456.00000000365B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
            Source: Revised PI_2024.exe, 00000083.00000002.30448881456.00000000365B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Revised PI_2024.exe, 00000083.00000002.30448881456.00000000365B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Revised PI_2024.exe, 00000083.00000002.30448881456.00000000365B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: Revised PI_2024.exe, 00000083.00000003.25821117001.0000000005D83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: Revised PI_2024.exe, 00000083.00000002.30438628723.0000000005D43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Revised PI_2024.exe, 00000083.00000002.30439489314.0000000007B10000.00000004.00001000.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.30438628723.0000000005D43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com//
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P&export=download
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P&export=download0
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1n-88UxRI8_HJBdcZ-vuH76hO3XJtjO5P&export=downloadt
            Source: Revised PI_2024.exe, 00000083.00000003.25858741072.0000000005D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
            Source: Revised PI_2024.exe, 00000083.00000003.25821117001.0000000005D83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Revised PI_2024.exe, 00000083.00000003.25821117001.0000000005D83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Revised PI_2024.exe, 00000083.00000003.25821117001.0000000005D83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Revised PI_2024.exe, 00000083.00000003.25821117001.0000000005D83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Revised PI_2024.exe, 00000083.00000003.25821117001.0000000005D83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
            Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
            Source: unknownHTTPS traffic detected: 142.250.217.110:443 -> 192.168.11.20:49771 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.69.193:443 -> 192.168.11.20:49772 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.20:49773 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_3879DAA0 SetWindowsHookExA 0000000D,00000000,?,?,?,?,?,?,?,?,?,3879E480,00000000,00000000131_2_3879DAA0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Revised PI_2024.exeJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00404FCD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404FCD
            Source: C:\Users\user\Desktop\Revised PI_2024.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
            Source: Conhost.exeProcess created: 89
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_004030E2 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030E2
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_004030E2 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,LdrInitializeThunk,GetTempPathA,GetWindowsDirectoryA,lstrcatA,LdrInitializeThunk,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,131_2_004030E2
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_0040480C0_2_0040480C
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_004062CF0_2_004062CF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00406AA60_2_00406AA6
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0040480C131_2_0040480C
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_004062CF131_2_004062CF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00406AA6131_2_00406AA6
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00113908131_2_00113908
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00118C08131_2_00118C08
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00114520131_2_00114520
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0011C2FF131_2_0011C2FF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00113C50131_2_00113C50
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_38793D47131_2_38793D47
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_38791B88131_2_38791B88
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: String function: 004029FD appears 48 times
            Source: Revised PI_2024.exe, 00000000.00000000.25343564453.0000000000440000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameopsplitningen.exeH vs Revised PI_2024.exe
            Source: Revised PI_2024.exe, 00000083.00000002.30438628723.0000000005D84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Revised PI_2024.exe
            Source: Revised PI_2024.exe, 00000083.00000002.30425828431.0000000000440000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameopsplitningen.exeH vs Revised PI_2024.exe
            Source: Revised PI_2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@393/7@3/3
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_004042DD GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004042DD
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\haandsbredderneJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nst40D.tmpJump to behavior
            Source: Revised PI_2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Revised PI_2024.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Revised PI_2024.exeReversingLabs: Detection: 28%
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile read: C:\Users\user\Desktop\Revised PI_2024.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "197^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "197^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Revised PI_2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.25861827661.00000000047F5000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.25860616069.00000000005D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.25860616069.0000000000604000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 3500, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "197^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "197^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405ECF GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405ECF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00110C45 push ebx; retf 131_2_00110C52
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00110C6D push edi; retf 131_2_00110C7A
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00110CCB push edi; retf 131_2_00110C7A
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nse49B.tmp\nsExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nse49B.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nse49B.tmp\BgImage.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nse49B.tmp\nsDialogs.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI/Special instruction interceptor: Address: 1E8B623
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: 365B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: 385B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 1200000Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nse49B.tmp\nsExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nse49B.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nse49B.tmp\BgImage.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nse49B.tmp\nsDialogs.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI coverage: 1.8 %
            Source: C:\Users\user\Desktop\Revised PI_2024.exe TID: 5072Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exe TID: 5072Thread sleep time: -1200000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Revised PI_2024.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405EA8 FindFirstFileA,FindClose,0_2_00405EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00402645 FindFirstFileA,131_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,131_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405EA8 FindFirstFileA,FindClose,131_2_00405EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 1200000Jump to behavior
            Source: Revised PI_2024.exe, 00000083.00000002.30438628723.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.30438628723.0000000005D43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Revised PI_2024.exe, 00000083.00000002.30438628723.0000000005D77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW_uE[
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI call chain: ExitProcess graph end nodegraph_0-3695
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI call chain: ExitProcess graph end nodegraph_0-3852
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405F41 LdrInitializeThunk,131_2_00405F41
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405ECF GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405ECF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "197^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Users\user\Desktop\Revised PI_2024.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405BC6 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405BC6
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000083.00000002.30448881456.0000000036601000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 7700, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts11
            Process Injection
            11
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            126
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Command and Scripting Interpreter
            Logon Script (Windows)Logon Script (Windows)2
            Obfuscated Files or Information
            1
            Credentials in Registry
            211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS141
            Virtualization/Sandbox Evasion
            Distributed Component Object Model21
            Input Capture
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets1
            Time Based Evasion
            SSH2
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Process Injection
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Time Based Evasion
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1476760 Sample: Revised PI_2024.exe Startdate: 19/07/2024 Architecture: WINDOWS Score: 100 42 drive.usercontent.google.com 2->42 44 drive.google.com 2->44 46 api.ipify.org 2->46 54 Multi AV Scanner detection for submitted file 2->54 56 Yara detected GuLoader 2->56 58 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 2->58 60 4 other signatures 2->60 8 Revised PI_2024.exe 31 2->8         started        signatures3 process4 file5 34 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->34 dropped 36 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 8->36 dropped 38 C:\Users\user\AppData\Local\...\System.dll, PE32 8->38 dropped 40 C:\Users\user\AppData\Local\...\BgImage.dll, PE32 8->40 dropped 62 Obfuscated command line found 8->62 12 Revised PI_2024.exe 15 8 8->12         started        16 cmd.exe 8->16         started        18 cmd.exe 8->18         started        20 62 other processes 8->20 signatures6 process7 dnsIp8 48 drive.google.com 142.250.217.110, 443, 49771 GOOGLEUS United States 12->48 50 drive.usercontent.google.com 142.250.69.193, 443, 49772 GOOGLEUS United States 12->50 52 api.ipify.org 172.67.74.152, 443, 49773 CLOUDFLARENETUS United States 12->52 64 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->64 66 Tries to steal Mail credentials (via file / registry access) 12->66 68 Tries to harvest and steal ftp login credentials 12->68 70 2 other signatures 12->70 22 Conhost.exe 16->22         started        24 Conhost.exe 18->24         started        26 Conhost.exe 20->26         started        28 Conhost.exe 20->28         started        30 Conhost.exe 20->30         started        32 59 other processes 20->32 signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.