Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rCOTA____OMAGNA.exe

Overview

General Information

Sample Name:rCOTA____OMAGNA.exe
Analysis ID:1349191
MD5:e8ae37869c7ad38c37445c1e16c7a065
SHA1:afdf5240a81479a5b020c0432741c203bc0bec01
SHA256:24b9d2af5baedd2f1a03ccce703c5a79251c10783108ab7a1816d24e464e64ce
Tags:exeRemcosRAT
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Obfuscated command line found
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Stores large binary data to the registry
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Contains functionality to dynamically determine API calls
Abnormal high CPU Usage
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
PE / OLE file has an invalid certificate
Creates or modifies windows services
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Contains functionality for read data from the clipboard
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • rCOTA____OMAGNA.exe (PID: 4612 cmdline: C:\Users\user\Desktop\rCOTA____OMAGNA.exe MD5: E8AE37869C7AD38C37445C1E16C7A065)
    • cmd.exe (PID: 4144 cmdline: cmd /c set /a "0x9E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3576 cmdline: cmd /c set /a "0x98^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5832 cmdline: cmd /c set /a "0x8E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3140 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5336 cmdline: cmd /c set /a "0xD8^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5876 cmdline: cmd /c set /a "0xD9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2352 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5788 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3288 cmdline: cmd /c set /a "0xB8^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3140 cmdline: cmd /c set /a "0x83^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5336 cmdline: cmd /c set /a "0x84^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6504 cmdline: cmd /c set /a "0x9C^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3180 cmdline: cmd /c set /a "0xBC^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6516 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2968 cmdline: cmd /c set /a "0x85^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4816 cmdline: cmd /c set /a "0x8F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3252 cmdline: cmd /c set /a "0x84^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6504 cmdline: cmd /c set /a "0x9C^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4292 cmdline: cmd /c set /a "0xC3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 320 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4080 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4148 cmdline: cmd /c set /a "0xDC^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5348 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3576 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6204 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4292 cmdline: cmd /c set /a "0xC2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4164 cmdline: cmd /c set /a "0x92^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3992 cmdline: cmd /c set /a "0x86^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 368 cmdline: cmd /c set /a "0x98^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3060 cmdline: cmd /c set /a "0x9D^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6504 cmdline: cmd /c set /a "0x88^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7064 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1576 cmdline: cmd /c set /a "0x9F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4308 cmdline: cmd /c set /a "0xC5^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5244 cmdline: cmd /c set /a "0x8F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5832 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2812 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5272 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6472 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5824 cmdline: cmd /c set /a "0xB4^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3620 cmdline: cmd /c set /a "0x84^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1276 cmdline: cmd /c set /a "0x9B^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1164 cmdline: cmd /c set /a "0x8E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3172 cmdline: cmd /c set /a "0x85^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4764 cmdline: cmd /c set /a "0xC3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3140 cmdline: cmd /c set /a "0x86^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5320 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1224 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7056 cmdline: cmd /c set /a "0xDF^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1784 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6108 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2764 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6196 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2860 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5348 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5876 cmdline: cmd /c set /a "0x93^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6520 cmdline: cmd /c set /a "0xD3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6220 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6800 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2300 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5344 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6448 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5952 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5320 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • SIHClient.exe (PID: 6848 cmdline: C:\Windows\System32\sihclient.exe /cv AZQPdMkTL0SlnyG2qylUew.0.2 MD5: 8BE47315BF30475EEECE8E39599E9273)
    • cmd.exe (PID: 2924 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2668 cmdline: cmd /c set /a "0x93^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3924 cmdline: cmd /c set /a "0xDA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1776 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6768 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5336 cmdline: cmd /c set /a "0xC2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5892 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3524 cmdline: cmd /c set /a "0xC5^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5320 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1224 cmdline: cmd /c set /a "0xDE^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3292 cmdline: cmd /c set /a "0x92^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3924 cmdline: cmd /c set /a "0xA0^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2232 cmdline: cmd /c set /a "0xAE^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4072 cmdline: cmd /c set /a "0xB9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4080 cmdline: cmd /c set /a "0xA5^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 368 cmdline: cmd /c set /a "0xAE^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5008 cmdline: cmd /c set /a "0xA7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5500 cmdline: cmd /c set /a "0xD8^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6204 cmdline: cmd /c set /a "0xD9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1732 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1276 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2764 cmdline: cmd /c set /a "0xBD^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2968 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2232 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1848 cmdline: cmd /c set /a "0x9F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5284 cmdline: cmd /c set /a "0x9E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5360 cmdline: cmd /c set /a "0x8A^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1516 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3524 cmdline: cmd /c set /a "0xAA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3408 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3144 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3292 cmdline: cmd /c set /a "0x84^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6152 cmdline: cmd /c set /a "0x88^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6460 cmdline: cmd /c set /a "0xAE^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3780 cmdline: cmd /c set /a "0x93^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5964 cmdline: cmd /c set /a "0xC3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1164 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3648 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3504 cmdline: cmd /c set /a "0xC6^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4372 cmdline: cmd /c set /a "0xDA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1272 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6184 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7136 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4436 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5660 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2072 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4852 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6152 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5832 cmdline: cmd /c set /a "0xDA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5712 cmdline: cmd /c set /a "0xD9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2360 cmdline: cmd /c set /a "0xD3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5264 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5160 cmdline: cmd /c set /a "0xD3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2352 cmdline: cmd /c set /a "0xDA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2924 cmdline: cmd /c set /a "0xD2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1656 cmdline: cmd /c set /a "0xD9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3180 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3144 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5004 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2136 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6460 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5344 cmdline: cmd /c set /a "0x93^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5964 cmdline: cmd /c set /a "0xD8^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3220 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5768 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5516 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5264 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5160 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4336 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2576 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1784 cmdline: cmd /c set /a "0xDD^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4324 cmdline: cmd /c set /a "0xDF^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5788 cmdline: cmd /c set /a "0xC2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2460 cmdline: cmd /c set /a "0x9B^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6768 cmdline: cmd /c set /a "0xC5^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5028 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5284 cmdline: cmd /c set /a "0xDF^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5336 cmdline: cmd /c set /a "0x92^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5768 cmdline: cmd /c set /a "0x86^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2300 cmdline: cmd /c set /a "0x98^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4456 cmdline: cmd /c set /a "0x9D^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2352 cmdline: cmd /c set /a "0x88^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6544 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7136 cmdline: cmd /c set /a "0x9F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6400 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5544 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4320 cmdline: cmd /c set /a "0xB4^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1776 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5228 cmdline: cmd /c set /a "0x98^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6460 cmdline: cmd /c set /a "0x8E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6764 cmdline: cmd /c set /a "0x8E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2568 cmdline: cmd /c set /a "0x80^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5480 cmdline: cmd /c set /a "0xC3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4112 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6504 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3524 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3652 cmdline: cmd /c set /a "0xDE^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5340 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2668 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1784 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4324 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIADAP.exe (PID: 5004 cmdline: wmiadap.exe /F /T /R MD5: 1BFFABBD200C850E6346820E92B915DC)
    • cmd.exe (PID: 3992 cmdline: cmd /c set /a "0xD8^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6444 cmdline: cmd /c set /a "0xDA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5648 cmdline: cmd /c set /a "0xD2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2464 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2360 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6568 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5496 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5264 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5160 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4036 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4308 cmdline: cmd /c set /a "0xC2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3292 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5544 cmdline: cmd /c set /a "0xC5^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3012 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4324 cmdline: cmd /c set /a "0xDC^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3992 cmdline: cmd /c set /a "0x92^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6460 cmdline: cmd /c set /a "0x86^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5648 cmdline: cmd /c set /a "0x98^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5448 cmdline: cmd /c set /a "0x9D^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6220 cmdline: cmd /c set /a "0x88^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1600 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4040 cmdline: cmd /c set /a "0x9F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6308 cmdline: cmd /c set /a "0xC5^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7064 cmdline: cmd /c set /a "0x8F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6980 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2924 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6544 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4352 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1524 cmdline: cmd /c set /a "0xB4^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3180 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3040 cmdline: cmd /c set /a "0x8E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3012 cmdline: cmd /c set /a "0x8A^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4324 cmdline: cmd /c set /a "0x8F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6444 cmdline: cmd /c set /a "0xC3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5892 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3772 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4980 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3220 cmdline: cmd /c set /a "0xDE^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2676 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6128 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6504 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7064 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6980 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7080 cmdline: cmd /c set /a "0xDF^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3752 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5412 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4436 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2412 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5460 cmdline: cmd /c set /a "0xDA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5432 cmdline: cmd /c set /a "0xD9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2104 cmdline: cmd /c set /a "0xD3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4580 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3572 cmdline: cmd /c set /a "0xD3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5520 cmdline: cmd /c set /a "0xDA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2952 cmdline: cmd /c set /a "0xD2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3840 cmdline: cmd /c set /a "0xD9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5776 cmdline: cmd /c set /a "0xC2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1684 cmdline: cmd /c set /a "0x92^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 380 cmdline: cmd /c set /a "0x9E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6348 cmdline: cmd /c set /a "0x98^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4508 cmdline: cmd /c set /a "0x8E^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4764 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6972 cmdline: cmd /c set /a "0xD8^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6764 cmdline: cmd /c set /a "0xD9^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2464 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2504 cmdline: cmd /c set /a "0xD1^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3192 cmdline: cmd /c set /a "0xA8^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3364 cmdline: cmd /c set /a "0x8A^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6848 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1516 cmdline: cmd /c set /a "0x87^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1252 cmdline: cmd /c set /a "0xBC^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2352 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5900 cmdline: cmd /c set /a "0x85^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1172 cmdline: cmd /c set /a "0x8F^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6524 cmdline: cmd /c set /a "0x84^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1268 cmdline: cmd /c set /a "0x9C^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3380 cmdline: cmd /c set /a "0xBB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1240 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6832 cmdline: cmd /c set /a "0x84^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5432 cmdline: cmd /c set /a "0x88^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2132 cmdline: cmd /c set /a "0xAA^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4848 cmdline: cmd /c set /a "0xC3^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3292 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3812 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4912 cmdline: cmd /c set /a "0x99^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2072 cmdline: cmd /c set /a "0xDF^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3040 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2656 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6436 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5488 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5820 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1848 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 368 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5028 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5480 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5272 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2516 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5876 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4204 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4456 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4836 cmdline: cmd /c set /a "0xC7^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3652 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4668 cmdline: cmd /c set /a "0x82^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5364 cmdline: cmd /c set /a "0xCB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6632 cmdline: cmd /c set /a "0xDB^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6688 cmdline: cmd /c set /a "0xC2^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2780 cmdline: cmd /c set /a "0x92^235" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4466934808.0000000002B6D000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    Process Memory Space: rCOTA____OMAGNA.exe PID: 4612JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: rCOTA____OMAGNA.exeVirustotal: Detection: 56%Perma Link
      Source: rCOTA____OMAGNA.exeReversingLabs: Detection: 43%
      Source: rCOTA____OMAGNA.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: rCOTA____OMAGNA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
      Source: SIHClient.exe, 00000082.00000003.2217164271.000002C59AC9F000.00000004.00000020.00020000.00000000.sdmp, SIHClient.exe, 00000082.00000003.2216079610.000002C59AC9F000.00000004.00000020.00020000.00000000.sdmp, SIHClient.exe, 00000082.00000003.2214835009.000002C59ACA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
      Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD41570.130.dr, 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.130.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
      Source: SIHClient.exe, 00000082.00000003.2214835009.000002C59AD00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8b6baea
      Source: SIHClient.exe, 00000082.00000003.2208701474.000002C59B5D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f327
      Source: rCOTA____OMAGNA.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: rCOTA____OMAGNA.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
      Source: rCOTA____OMAGNA.exeString found in binary or memory: http://s.symcd.com06
      Source: rCOTA____OMAGNA.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
      Source: rCOTA____OMAGNA.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
      Source: rCOTA____OMAGNA.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
      Source: SIHClient.exe, 00000082.00000003.2216265016.000002C59B5F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
      Source: rCOTA____OMAGNA.exeString found in binary or memory: https://d.symcb.com/cps0%
      Source: rCOTA____OMAGNA.exeString found in binary or memory: https://d.symcb.com/rpa0
      Source: rCOTA____OMAGNA.exeString found in binary or memory: https://d.symcb.com/rpa0.
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056DE
      Source: conhost.exeProcess created: 251
      Source: rCOTA____OMAGNA.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: C:\Windows\System32\wbem\WMIADAP.exeFile deleted: C:\Windows\System32\wbem\Performance\WmiApRpl.h
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_0040755C0_2_0040755C
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_00406D850_2_00406D85
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_6E381BFF0_2_6E381BFF
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess Stats: CPU usage > 49%
      Source: rCOTA____OMAGNA.exe, 00000000.00000000.2010250408.000000000045A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesupertankernes fantastico.exe4 vs rCOTA____OMAGNA.exe
      Source: rCOTA____OMAGNA.exeBinary or memory string: OriginalFilenamesupertankernes fantastico.exe4 vs rCOTA____OMAGNA.exe
      Source: rCOTA____OMAGNA.exeStatic PE information: invalid certificate
      Source: rCOTA____OMAGNA.exeVirustotal: Detection: 56%
      Source: rCOTA____OMAGNA.exeReversingLabs: Detection: 43%
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile read: C:\Users\user\Desktop\rCOTA____OMAGNA.exeJump to behavior
      Source: rCOTA____OMAGNA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\rCOTA____OMAGNA.exe C:\Users\user\Desktop\rCOTA____OMAGNA.exe
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB8^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBC^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDC^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9B^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\SIHClient.exe C:\Windows\System32\sihclient.exe /cv AZQPdMkTL0SlnyG2qylUew.0.2
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x93^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB9^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x93^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC6^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9B^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x80^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDE^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\wbem\WMIADAP.exe wmiadap.exe /F /T /R
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD2^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD2^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA8^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBC^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAA^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDC^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x93^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC6^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile created: C:\Users\user\AppData\Local\Temp\nskA6BE.tmpJump to behavior
      Source: classification engineClassification label: mal72.troj.evad.winEXE@631/26@0/0
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040498A
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5284:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3808:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2824:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5336:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6980:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3596:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5812:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4036:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1524:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3964:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5308:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2020:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4304:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5604:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4848:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3180:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1292:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5264:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6824:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6100:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6196:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4372:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4996:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5804:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4204:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3060:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2860:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1308:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2464:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2792:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6656:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1272:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5544:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7080:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5228:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3172:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5532:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1408:120:WilError_03
      Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Lib
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6692:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6556:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4352:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6544:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1224:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5040:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5272:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4568:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2472:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6704:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5608:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6308:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3252:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5304:120:WilError_03
      Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\ADAP_WMI_ENTRY
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3948:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3620:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6156:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6496:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1276:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6412:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7016:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3752:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5028:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1516:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:368:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5276:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2504:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:516:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:356:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1776:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3288:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6108:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5344:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3504:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:412:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4764:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_03
      Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Flag
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2820:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6764:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3924:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5832:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6504:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2924:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5064:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6516:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:764:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6448:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5448:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5516:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6800:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:760:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2460:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4296:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5648:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6512:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2800:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7096:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1576:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6768:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2876:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3184:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1656:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3580:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1496:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5320:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4852:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3660:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5892:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3920:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5032:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4536:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5864:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1600:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2136:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5044:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6044:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3408:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6252:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4464:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2668:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7056:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4396:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7136:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6204:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2964:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6828:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5160:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2568:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6488:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:408:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5340:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4080:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4816:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2352:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5352:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1852:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5268:120:WilError_03
      Source: C:\Windows\System32\SIHClient.exeMutant created: {376155FF-95A0-46CA-8F57-ACB09EA70153}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1848:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5376:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6444:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5008:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7164:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5404:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_03
      Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6128:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1360:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5688:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4524:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5824:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7060:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4836:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1536:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5768:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5796:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4072:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5360:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3140:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4292:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2292:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5020:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2968:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2232:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4280:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1164:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4164:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6220:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5560:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5244:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3720:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1732:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5176:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4324:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4980:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6188:120:WilError_03
      Source: C:\Windows\System32\wbem\WMIADAP.exeFile written: C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
      Source: C:\Windows\System32\SIHClient.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Windows\System32\SIHClient.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: C:\Windows\System32\SIHClient.exeFile read: C:\Windows\System32\drivers\etc\hosts
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: rCOTA____OMAGNA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: Yara matchFile source: Process Memory Space: rCOTA____OMAGNA.exe PID: 4612, type: MEMORYSTR
      Source: Yara matchFile source: 00000000.00000002.4466934808.0000000002B6D000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB8^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBC^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDC^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9B^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x93^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB9^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x93^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC6^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9B^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x80^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDE^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD2^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD2^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA8^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBC^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAA^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDC^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x93^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC6^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD2^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBC^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_6E3830C0 push eax; ret 0_2_6E3830EE
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_6E381BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E381BFF
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile created: C:\Users\user\AppData\Local\Temp\nsfA826.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile created: C:\Users\user\AppData\Local\Temp\nsfA826.tmp\nsExec.dllJump to dropped file
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile created: C:\Users\user\AppData\Local\Temp\nsfA826.tmp\Banner.dllJump to dropped file
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile created: C:\Users\user\AppData\Local\Temp\nsfA826.tmp\BgImage.dllJump to dropped file
      Source: C:\Windows\System32\wbem\WMIADAP.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WmiApRpl\Performance
      Source: C:\Windows\System32\wbem\WMIADAP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\PROVIDERS\Performance Performance Data
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\SIHClient.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeRDTSC instruction interceptor: First address: 0000000003156DCF second address: 0000000003156DCF instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FBCBCE510A7h 0x00000006 test cx, cx 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exe TID: 5860Thread sleep time: -47000s >= -30000sJump to behavior
      Source: C:\Windows\System32\SIHClient.exe TID: 7152Thread sleep time: -60000s >= -30000s
      Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 6252Thread sleep count: 2355 > 30
      Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 6252Thread sleep count: 1420 > 30
      Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 6252Thread sleep count: 909 > 30
      Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 6252Thread sleep count: 897 > 30
      Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 6252Thread sleep count: 1420 > 30
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeWindow / User API: threadDelayed 470Jump to behavior
      Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 2355
      Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 1420
      Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 909
      Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 897
      Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 1420
      Source: C:\Windows\System32\SIHClient.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
      Source: C:\Windows\System32\SIHClient.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
      Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
      Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
      Source: C:\Windows\System32\SIHClient.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
      Source: C:\Windows\System32\SIHClient.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
      Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
      Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeAPI call chain: ExitProcess graph end nodegraph_0-4665
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeAPI call chain: ExitProcess graph end nodegraph_0-4509
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
      Source: SIHClient.exe, 00000082.00000003.2594100417.000002C59ACBC000.00000004.00000020.00020000.00000000.sdmp, SIHClient.exe, 00000082.00000002.2595312941.000002C59ACBC000.00000004.00000020.00020000.00000000.sdmp, SIHClient.exe, 00000082.00000003.2217164271.000002C59ACBC000.00000004.00000020.00020000.00000000.sdmp, SIHClient.exe, 00000082.00000003.2214835009.000002C59ACBC000.00000004.00000020.00020000.00000000.sdmp, SIHClient.exe, 00000082.00000003.2216079610.000002C59ACBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: SIHClient.exe, 00000082.00000003.2594100417.000002C59AC65000.00000004.00000020.00020000.00000000.sdmp, SIHClient.exe, 00000082.00000002.2595312941.000002C59AC65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`m
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_6E381BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E381BFF
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDC^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDF^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x93^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC6^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x88^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xB4^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x86^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC5^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x87^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD2^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xA8^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8A^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\SIHClient.exe C:\Windows\System32\sihclient.exe /cv AZQPdMkTL0SlnyG2qylUew.0.2Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBC^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x85^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9C^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xBB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x84^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xAA^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x8E^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC7^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9F^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x98^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x99^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC3^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD1^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xD9^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x9D^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDE^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x82^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xCB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xDB^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0xC2^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c set /a "0x92^235"Jump to behavior
      Source: C:\Users\user\Desktop\rCOTA____OMAGNA.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
      Valid Accounts2
      Windows Management Instrumentation
      1
      Windows Service
      1
      Access Token Manipulation
      1
      Masquerading
      OS Credential Dumping111
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
      System Shutdown/Reboot
      Acquire InfrastructureGather Victim Identity Information
      Default Accounts1
      Command and Scripting Interpreter
      Boot or Logon Initialization Scripts1
      Windows Service
      1
      Modify Registry
      LSASS Memory2
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      Exfiltration Over BluetoothJunk DataSIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
      Domain Accounts1
      Native API
      Logon Script (Windows)11
      Process Injection
      2
      Virtualization/Sandbox Evasion
      Security Account Manager1
      Application Window Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
      Local AccountsCronLogin HookLogin Hook1
      Access Token Manipulation
      NTDS1
      Remote System Discovery
      Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
      Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
      Process Injection
      LSA Secrets4
      File and Directory Discovery
      SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
      Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Deobfuscate/Decode Files or Information
      Cached Domain Credentials123
      System Information Discovery
      VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
      External Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Obfuscated Files or Information
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
      Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1349191 Sample: rCOTA____OMAGNA.exe Startdate: 28/11/2023 Architecture: WINDOWS Score: 72 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected GuLoader 2->43 7 rCOTA____OMAGNA.exe 3 215 2->7         started        process3 file4 33 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 7->33 dropped 35 C:\Users\user\AppData\Local\...\System.dll, PE32 7->35 dropped 37 C:\Users\user\AppData\Local\...\BgImage.dll, PE32 7->37 dropped 39 C:\Users\user\AppData\Local\...\Banner.dll, PE32 7->39 dropped 45 Obfuscated command line found 7->45 47 Tries to detect virtualization through RDTSC time measurements 7->47 11 cmd.exe 1 7->11         started        13 cmd.exe 1 7->13         started        15 cmd.exe 1 7->15         started        17 271 other processes 7->17 signatures5 process6 process7 19 conhost.exe 11->19         started        21 conhost.exe 13->21         started        23 conhost.exe 15->23         started        25 conhost.exe 17->25         started        27 conhost.exe 17->27         started        29 conhost.exe 17->29         started        31 266 other processes 17->31

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      rCOTA____OMAGNA.exe57%VirustotalBrowse
      rCOTA____OMAGNA.exe43%ReversingLabsWin32.Trojan.Guloader
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\Banner.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\Banner.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\BgImage.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\BgImage.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\System.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\nsExec.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsfA826.tmp\nsExec.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://www.microsoft.co0%Avira URL Cloudsafe
      http://www.microsoft.co1%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorErrorrCOTA____OMAGNA.exefalse
        high
        http://www.microsoft.coSIHClient.exe, 00000082.00000003.2216265016.000002C59B5F9000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox Version:38.0.0 Ammolite
        Analysis ID:1349191
        Start date and time:2023-11-28 11:27:48 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 13m 5s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:548
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:rCOTA____OMAGNA.exe
        Detection:MAL
        Classification:mal72.troj.evad.winEXE@631/26@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 42
        • Number of non-executed functions: 32
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Excluded IPs from analysis (whitelisted): 20.114.59.183, 67.26.241.254, 8.253.139.121, 67.26.237.254, 8.253.45.214, 8.253.139.248, 13.85.23.206, 72.21.81.240, 52.165.164.15
        • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, slscr.update.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • Report size getting too big, too many NtWriteVirtualMemory calls found.
        TimeTypeDescription
        11:28:56API Interceptor2x Sleep call for process: SIHClient.exe modified
        11:29:34API Interceptor170x Sleep call for process: rCOTA____OMAGNA.exe modified
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsfA826.tmp\BgImage.dllrCOTA____OMAGNALTDAMFOC231877756745758450045.exeGet hashmaliciousGuLoader, RemcosBrowse
          rCOTA____OMAGNALTDAMFOC231877756745758450045.exeGet hashmaliciousGuLoaderBrowse
            C:\Users\user\AppData\Local\Temp\nsfA826.tmp\Banner.dllrCOTA____OMAGNALTDAMFOC231877756745758450045.exeGet hashmaliciousGuLoader, RemcosBrowse
              rCOTA____OMAGNALTDAMFOC231877756745758450045.exeGet hashmaliciousGuLoaderBrowse
                va9yqoHxmn.exeGet hashmaliciousGuLoaderBrowse
                  va9yqoHxmn.exeGet hashmaliciousGuLoaderBrowse
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3444
                    Entropy (8bit):5.011954215267298
                    Encrypted:false
                    SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                    MD5:B133A676D139032A27DE3D9619E70091
                    SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                    SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                    SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                    Malicious:false
                    Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
                    Category:dropped
                    Size (bytes):4770
                    Entropy (8bit):7.946747821604857
                    Encrypted:false
                    SSDEEP:96:9/nBu64pydcvOHRUfu0xK1bQYMRSRNoYmxYvk56sHMZhh4m:9/nBuP2cGxUfu6K1bpWJ6vfh4m
                    MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
                    SHA1:719C37C320F518AC168C86723724891950911CEA
                    SHA-256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
                    SHA-512:02F88DA4B610678C31664609BCFA9D61DB8D0B0617649981AF948F670F41A6207B4EC19FECCE7385A24E0C609CBBF3F2B79A8ACAF09A03C2C432CC4DCE75E9DB
                    Malicious:false
                    Preview:MSCF............,...................O.................2Wqh .disallowedcert.stl....^K...CK.wTS...:.w.K'.C0T.....Bh.{....C.).*.....Y@...(..).R."E..D^6........u....|f~3...o.3. ..SPK.k.o#...."{-.U..P........:..aPr.@.d......Dy.h.....)..:...!./\A.....A<I_<$...q.h..........'.....7....H...@`T..K.S.%...Y4..R.....`.....-....D...(..b..-c."...G.=.dx..S+..2.a.E....d.L...77J...c.[..@..iT&..^78..g....NW6.Ek..FY.F........cNt.O.*..R....*......D...... k........J.y...z.d...;.9_t...].@....yw..}.x....d.t..`f\K..;|.*h.X...4/.;.xT......q>.0...<...3...X..L$.&.,b.....\V....\......G..O..@..H3.....t..J..).x.?.{[..G>.7...<...^Q..z..Gw9P..d....i].n%K}.*z..2.Py...A..s...z..@...4..........4.....*Y.d..._Z.5.s..fl.C..#.K{9^.E...k..z.Ma..G.(.....5g. ...}.t.#4....$;.,....S@fs....k......u .^2.#_...I........;.......w..P...UCY...$;.S._|.x..dK...[i..q..^.l..A.?.....'N.. .L.l......m.*.+f#]............A.;.....Z..rIt....RW....Kr1e=8.=.z:Oi.z.d..r..C_......o...]j.N;.s....3@3.dgrv.
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):338
                    Entropy (8bit):3.174857563182266
                    Encrypted:false
                    SSDEEP:6:kKFDAN+SkQlPlEGYRMY9z+s3Ql2DUevat:x/kPlE99SCQl2DUevat
                    MD5:5E79F87E9F3B83674CA4F227027132FC
                    SHA1:E10D8BF83434495A5B18BED865608E767499AE6E
                    SHA-256:08D25C3A2289D46C502850A4B2CEEF78984747D4E54429A7021A971C4131632B
                    SHA-512:487F76F2FF428A99B4A06D096711D0E8AB045D0BAE4DAAE241AA4E85A42A8B75892CEE35647541EC52AC4D73A7AC7579D6B7283CE39E2955D292EC25153B17A4
                    Malicious:false
                    Preview:p...... .........j...!..(....................................................... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):78798
                    Entropy (8bit):2.6708764379304153
                    Encrypted:false
                    SSDEEP:1536:oe+/CHxjm/OdvISUoGSg6Iw/hcuPZKRa4kV15Xotvz:o205gVPW
                    MD5:2F6FDBD4B41C63D4DDDA506CEEF847A5
                    SHA1:01F6F46C53F1709776D4C10E3AEAA6BF61EAB7F2
                    SHA-256:16FDDD5D146BAB969A2006339EF04DD79367D2A76BBB361B67E6A23086AA9D3D
                    SHA-512:8129EEE5D3097E9B468C04B1A95D600E6BBAEA7489DB09550E6ADD922EA9C5BC245754EED822D79AF487381B3D204552BC355E8066A02964DF1DE890105B330C
                    Malicious:false
                    Preview:000000001E1E1E00F5F5F5F5F5000000EEEEEE00000000F600006C6C0000006E6E6E000000000040400000000004000000E3006A009696960051000000B7B700001D1D00C3007F7F7F000024240028000000000000000000730016160000DC0000000000007200002D0000E0000000000012000044440000E800EAEA0000707000E90056002727000000006100BDBD002A2A2A2A000039000000000000C9C9009800626262620000004C4C4C008F0004040400D900002D00690094949400525200A50000EB002121007D00B10000C3000000004300470000000000BFBFBF0000B9B9B900000F0F00006F000000BA000000D9D90000CACACA0061616100000080004E00000000C90000006B00969696006D6D000000000072727272001A00007300CFCF0000000091919100000023230000B50000DB00595900DB0000A80000000700FCFC0000C2C200E0000000E0E00000E9002A0064646400AA009C000000007B7B000000001B1B00282828007A7A7A7A0000E1E100DA0000AAAA00FA00006A6A6A6A0000CBCB00A400FA00000000000064002E2E2E000000F6000000B3B3B3007C7C0000001A1A1A009999005F5F00A200E6E600000E0E0E0E0E000000C100EEEE0000000000131300FF000000000056000000002D2D2D0000CF0058585800C800000000850000006700850000666600020000
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):5045406
                    Entropy (8bit):0.2976889737184529
                    Encrypted:false
                    SSDEEP:768:ip3Ozo3jSwMnREaS2TWc0hlIra3ApJooqMA3EbRReOjbU8IuoAwz+ouII/qoTSA5:uIHTuYZFumgPxIe
                    MD5:959D43BF7EC45DBF4EB1630642DA8620
                    SHA1:964F3CB604BA1BFD7452A58BE4A38DBCBAAA321A
                    SHA-256:DE50678B47D6F37C0CACB6B6BA262E117683816A24CE97EB96C779DE3F7DAAD3
                    SHA-512:67E0F08B78075A5A8671BC511BC0263197C656F3FC5307FAF6764FAB825F42C44219174A390E34B62A6F66EE4E15B3DF7114FCC4EF3E0346B938E0BDF3D86311
                    Malicious:false
                    Preview:....................................................................................................................................................................................................................................R............................ ........................h................K.........................................................v.....................................u..........................................................................................................................................?....................s..........................................................................<................................................................................................................................o......................................................................................................................:...............................&.........................................................................................
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:ASCII text, with very long lines (341), with no line terminators
                    Category:dropped
                    Size (bytes):341
                    Entropy (8bit):4.305896476778674
                    Encrypted:false
                    SSDEEP:6:OvNulc7HrzTGMCyqT8X15MJkmAKFU6gEgNubui6NvWAXNzwMEaloJxu:OvNuajTGMCyqTGwBrbuHNOAXNzwMEZJA
                    MD5:FC0BBEC30C4902D8C126FBFA0A00C090
                    SHA1:6E95646507E1EFF4F802C332455794E21BC0F8F3
                    SHA-256:6991709B1D51209BA839874F54BBE9760EEFF8AD11667A5AA362682B34EA25FA
                    SHA-512:B87D887D491F591CBBD35746341333DAC1C06CD91727B3B9294708D71D426357CD06D3470FE9C236263553D9C03902EE28982CD9C9A9722E688876512C1FE307
                    Malicious:false
                    Preview:tritoconid dieldrins wigglier,lathyrism offerviljer thermogeny rabiates photooxidation ani,skandalepresse kenns strmafbrydelsens midtlinje mcdaniel stumpede,adenotomic rufus nedsttendes spidvender papiroplysninger pinecone.condescend bislagenes langeel nighnesses quercivorous hofdame,fremontia frydefuldt scotopic luxulianite polydactylism,
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):168577
                    Entropy (8bit):7.780404690965998
                    Encrypted:false
                    SSDEEP:3072:DRJl5jBX9fGiv0MlYTB16kIodWZNnUVVsjidCzQMbRYZFKOy0Bv9:Dzf9X9fhmF1iodGnwqjfRqd9
                    MD5:2BD37F8C5E720F6509C67F9A0F367F04
                    SHA1:23199E6B4FFC25D9E67B8525074C512FB44F64B9
                    SHA-256:4B2128BC72F0285B5CDF7D261168CFC6652AE5BCE16FD383CBF414B29B926F8E
                    SHA-512:7B10ABCC8DB30A85E302B7C6331621151D14346F03E9F0CD07B921E1CD774F74298C8D73DD0B0C147B2540A6C3C24531E91F1697C85D27DF3DC6794546927646
                    Malicious:false
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):4481203
                    Entropy (8bit):0.29610314312880837
                    Encrypted:false
                    SSDEEP:768:mWQEmpUAV+gNzTp6HnGPn+Rk+avXYyyOaXUTnGxW0qQ62b3VsUlEEsZHVUiAq6e8:uXDQ452YYfXqFoiB
                    MD5:D6DF1306D17BCDE2D862ACEB97D9A3F7
                    SHA1:5D8A04EE4B0242D7B3CB80EF8AB0E205C634F9EC
                    SHA-256:3F8E72B9D05C86B9A07FE154A7F5FE8FC0AB8BEDC4BCC297E4801C8812070B65
                    SHA-512:76A47A31175F872512674D617A93E78502FC344EFF5C25671C0E72C1EBCEF6FA417DF4822EBCA119878846C10AA5DC45EF1AADCCFBBCDBAB7DD06E8A42BC24BF
                    Malicious:false
                    Preview:.......................................................................................................................................]...................................................x......................................................................................................................................................................................................................................................................................................................................................................................................................................................................+.............................................................................................................................................................................a................................................C...........................................................V..........................................................................
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):4096
                    Entropy (8bit):3.679447058913102
                    Encrypted:false
                    SSDEEP:48:qfvVqdq/6waPy6Qths/zvXg1ss0Ai+wGXwBxirvdcwr1B38:E8A6wwzvwV0TFGABxix/1C
                    MD5:A1B9BDEE9FC87D11676605BD79037646
                    SHA1:8D6879F63048EB93B9657D0B78F534869D1FFF64
                    SHA-256:39E3108E0A4CCFB9FE4D8CAF4FB40BAA39BDD797F3A4C1FA886086226E00F465
                    SHA-512:CD65D18ECA885807C7C810286CEBEF75555D13889A4847BB30DC1A08D8948893899CC411728097641A8C07A8DCC59E1C1EFA0E860E93DADA871D5B7ACC61B1E5
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    • Antivirus: Virustotal, Detection: 0%, Browse
                    Joe Sandbox View:
                    • Filename: rCOTA____OMAGNALTDAMFOC231877756745758450045.exe, Detection: malicious, Browse
                    • Filename: rCOTA____OMAGNALTDAMFOC231877756745758450045.exe, Detection: malicious, Browse
                    • Filename: va9yqoHxmn.exe, Detection: malicious, Browse
                    • Filename: va9yqoHxmn.exe, Detection: malicious, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........b.............................. ......0#......Rich............................PE..L....Oa...........!......................... ...............................P............@.........................."..h...l ..<............................@....................................................... ..l............................text...j........................... ..`.rdata..(.... ......................@..@.data...<....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):7680
                    Entropy (8bit):5.220781837592475
                    Encrypted:false
                    SSDEEP:96:8eUk1LFJaO1/radJEaYtv1Zs4lkL8y3A2EN8Cmy3uTR4j7J3kWyy/:t/TJa2roqJyA2EN8diuTuje
                    MD5:114596F7BC4A72669BF8664F3C583FBF
                    SHA1:F1822C1AA0A45C448ADF9427E3CFFF49965480DF
                    SHA-256:BB79DC8B1F8BBD3296E4406128040CD1652404BE6B9387E780D3341BB1ED935B
                    SHA-512:99BBAEA89766411F7BC2FD5570565E8341F382ED0877CD397A1A3D92297BEAE23E95BA643339045B74FE97EDEB7C87A460C8AAAF75742EA05058245C0F1DC0FF
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    • Antivirus: Virustotal, Detection: 0%, Browse
                    Joe Sandbox View:
                    • Filename: rCOTA____OMAGNALTDAMFOC231877756745758450045.exe, Detection: malicious, Browse
                    • Filename: rCOTA____OMAGNALTDAMFOC231877756745758450045.exe, Detection: malicious, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....Oa...........!................"........ ...............................`............@..........................$....... ..d............................P....................................................... ...............................text...D........................... ..`.rdata....... ......................@..@.data........0......................@....reloc..v....P......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):12288
                    Entropy (8bit):5.814115788739565
                    Encrypted:false
                    SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                    MD5:CFF85C549D536F651D4FB8387F1976F2
                    SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                    SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                    SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    • Antivirus: Virustotal, Detection: 0%, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):7168
                    Entropy (8bit):5.298362543684714
                    Encrypted:false
                    SSDEEP:96:J9zdzBzMDByZtr/HDQIUIq9m6v6vBckzu9wSBpLEgvElHlernNQaSGYuH2DQ:JykDr/HA5v6G2IElFernNQZGdHW
                    MD5:675C4948E1EFC929EDCABFE67148EDDD
                    SHA1:F5BDD2C4329ED2732ECFE3423C3CC482606EB28E
                    SHA-256:1076CA39C449ED1A968021B76EF31F22A5692DFAFEEA29460E8D970A63C59906
                    SHA-512:61737021F86F54279D0A4E35DB0D0808E9A55D89784A31D597F2E4B65B7BBEEC99AA6C79D65258259130EEDA2E5B2820F4F1247777A3010F2DC53E30C612A683
                    Malicious:false
                    Antivirus:
                    • Antivirus: Virustotal, Detection: 0%, Browse
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L.....Oa...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3444
                    Entropy (8bit):5.011954215267298
                    Encrypted:false
                    SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                    MD5:B133A676D139032A27DE3D9619E70091
                    SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                    SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                    SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                    Malicious:false
                    Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
                    Category:dropped
                    Size (bytes):48786
                    Entropy (8bit):3.5854495362228453
                    Encrypted:false
                    SSDEEP:384:esozoNc1+12zG1+b61ubSGMLVrj4+PtC81ZBg4Lg4ung4og4uo91K91zI91K91z2:esozozBg4Lg4ung4og4uWG4MG4o1
                    MD5:DF877BEC5C9E3382E94FEA48FEE049AC
                    SHA1:1D61436C8A1C057C1B1089EB794D90EE4B0D8FE9
                    SHA-256:7F0F3FA64E41A30BACA377B6399F8F7087BC54DA9FCA876BFDC2C2EEECA8454B
                    SHA-512:433CB16EBE2292CB60CB8CE71207EBB752295FB73E6D13E215E771EC5FC433EE29577AF28641255810C18078B95F04A9D37734B6F49CB6A6302821E365672205
                    Malicious:false
                    Preview:.././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././....././....././. .C.o.p.y.r.i.g.h.t. .(.C.). .2.0.0.0. .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n....././....././. .M.o.d.u.l.e. .N.a.m.e.:....././. .W.m.i.A.p.R.p.l....././....././. .A.b.s.t.r.a.c.t.:....././....././. .D.e.s.c.r.i.b.e.s. .a.l.l. .t.h.e. .c.o.u.n.t.e.r.s. .s.u.p.p.o.r.t.e.d. .v.i.a. .W.M.I. .H.i.-.P.e.r.f.o.r.m.a.n.c.e. .p.r.o.v.i.d.e.r.s....././....././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.............[.i.n.f.o.].....d.r.i.v.e.r.n.a.m.e.=.W.m.i.A.p.R.p.l.....s.y.m.b.o.l.f.i.l.e.=.W.m.i.A.p.R.p.l...h.........[.l.a.n.g.u.a.g.e.s.].....0.0.9.=.E.n.g.l.i.s.h.....0.0.9.=.E.n.g.l.i.s.h.........[.o.b.j.e.c.t.s.].....W.M.I._.O.b.j.e.c.t.s._.0.0.
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):12288
                    Entropy (8bit):3.1639403213473325
                    Encrypted:false
                    SSDEEP:192:F2R92xVJKF/UUYAg1HoaSRSy7bKzOEO/zNUx:FIiVJM/UUYAg1HodRSy7mzOEO/zNUx
                    MD5:3AE0E6D609EB8DA0F8410F4DEEF60E5C
                    SHA1:78DC1ECDAF55C41A712EB4887A7F6B17164A7D24
                    SHA-256:D8FF5B5B0F504F88A72A5A01C353B629F8FF2DD518531A4A3AFE89D84C0182CA
                    SHA-512:6D76527D8FD9F999F5801D284AA9624672A7217F6D1C1EBB052C5CD7B0BB7E596D0DF8E8D1C27A8CE217333A6470485A46E2090A8FB767672C55B8A725B5370E
                    Malicious:false
                    Preview:....P...P.......................................P...!....................................t.....................eJ...........!..Zb....... ..........................................@.t.z.r.e.s...d.l.l.,.-.3.2.2.......................................................@.t.z.r.e.s...d.l.l.,.-.3.2.1............................................................W..................!..........S.I.H._.t.r.a.c.e._.l.o.g...C.:.\.W.i.n.d.o.w.s.\.L.o.g.s.\.S.I.H.\.S.I.H...2.0.2.3.1.1.2.8...1.1.2.8.5.4...1.1.5...1...e.t.l.......P.P..........t.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:Microsoft Cabinet archive data, single, 462 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 31944, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
                    Category:dropped
                    Size (bytes):17126
                    Entropy (8bit):7.3117215578334935
                    Encrypted:false
                    SSDEEP:192:D5X8WyNHDHFzqDHt8AxL5TKG+tJSdqnajapCNjFZYECUqY7oX9qhnJSdqnaja2Sl:qDlsHq4ThPdlmY9CUiqOdlm2W
                    MD5:1B6460EE0273E97C251F7A67F49ACDB4
                    SHA1:4A3FDFBB1865C3DAED996BDB5C634AA5164ABBB8
                    SHA-256:3158032BAC1A6D278CCC2B7D91E2FBC9F01BEABF9C75D500A7F161E69F2C5F4A
                    SHA-512:3D256D8AC917C6733BAB7CC4537A17D37810EFD690BCA0FA361CF44583476121C9BCCCD9C53994AE05E9F9DFF94FFAD1BB30C0F7AFF6DF68F73411703E3DF88A
                    Malicious:false
                    Preview:MSCF............D................|...............A..........d.......................environment.xml.....b...CK..ao.0...J...&.q...-..;+.6+-i.......7.....=....g.P.RQ.#..#...QQ..p.kk..qX..)...T.....zL#<.4......\k..f..,.Q...`..K7.hP..".E.53.V.DW.X).z.=`.COO 8..8.......!$.P!`00....E.m..l .)".J.vC..J..&...5.5(.a..!..MIM...*......z.;......t.<.o..|CR.3>..n.;8dX....:....N.....U.......J.I(vT..3...N....$.._^.A<....&=._(N....m.u.1}.....Ax.b8....q~.i..0.A...*.H........A.0.@....1.0...`.H.e......0....+.....7......0..0V..+.....7....H.......$f.....`..41200..+.....7...1". ...,..gK.........(...._`Oa..;%.010...`.H.e....... K...,.%@.b./.a...Q.:..E.7....V~....0...0..........3....!.G~&.9......0...*.H........0~1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1(0&..U....Microsoft Update Signing CA 2.20...190502214449Z..200502214449Z0o1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1.0...U....Microsoft Update0.."0...*
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:Microsoft Cabinet archive data, single, 7826 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 53283, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
                    Category:dropped
                    Size (bytes):24490
                    Entropy (8bit):7.629144636744632
                    Encrypted:false
                    SSDEEP:384:iarwQcY8StpA7IQ6GCq30XPSIleI7lzCuqvfiSIleIx:iartHA7PCFP66Tqvfi6c
                    MD5:ACD24F781C0C8F48A0BD86A0E9F2A154
                    SHA1:93B2F4FBF96D15BE0766181AFACDB9FD9DD1B323
                    SHA-256:5C0A296B3574D170D69C90B092611646FE8991B8D103D412499DBE7BFDCCCC49
                    SHA-512:7B1D821CF1210947344FCF0F9C4927B42271669015DEA1C179B2BEAD9025941138C139C22C068CBD7219B853C80FA01A04E26790D8D76A38FB8BEBE20E0A2A4A
                    Malicious:false
                    Preview:MSCF............D...............#................A..........d........B..............environment.cab.x.\&..BCK.\.T...N.....;LB.JW.. .w!....$*...U....."........ (.. E..........w...e.Jf.3gN.{...{V.M4.!.....hn. p(... .a...f..f..j.....Kh5..l.DB\}.=.0.>..X.....z..,'..LC/>....h.>.>.........,~mVI.....'EGD]^..\{....Q....f...4.F.....q..FF.1~...Q,.."g.qq.......}.....g%Zz.;m.9..z../2Jl.p8wGO......-V....FM......y*.....Hy.xy......N.r;.@uV........Xa...b].`..F...y.Wd.e.8.[Z.s7].....=B.$...'.|.-.sC....a_(..$..i.C.T.F}...]...m.R,y.1...'..j3.....ir..B..)sR.G.*..`-=.w....m..2y.....*o...\{..C.4.:ZM..wL-$.I.x:?.!.....:..W.%&.....J.%.....~....E..T.d.Q{..p..J..pY...P../.."rp....`...#w.....'.|n%Dy,.....i....."..x.....b._..\_.^.XOo..*:.&a.`..qA.?.@..t.R/...X3.nF.&........1Z.r.S...9x........?..aP..A...f..k:..\....L...t....Q...1..A..33A1.t..)...c....;......$.$..>._....A.!g`..t...b.H.L..&.....!......v~.n...uE.x...."5.h.4..B.R.d.4.%--.`.B..."..[....l......x(..5......@.zr....
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:Microsoft Cabinet archive data, single, 283 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 18148, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
                    Category:modified
                    Size (bytes):17395
                    Entropy (8bit):7.297808060361236
                    Encrypted:false
                    SSDEEP:192:Y++BFO7SCP3yalzqDHt8Axz5GIqMvus/qnajBMWj6AkKFZYECUqY7S8Zuo1nqnaC:lCksHqzj0l9P6AnCUTZZl9lRo
                    MD5:E97660B7AB6838D0D96B5C6BB4328753
                    SHA1:AA104E62A8166E23D89C4769EC382EF345299D28
                    SHA-256:2BA13EB8A2705B01E54067B2A4FFC17CA2EB376EE3F3BA8D9C5FACE8C5AC1279
                    SHA-512:E867FE411239AD8EB66342C9522D48DBC9BB872210CD14B4C734661C4966AEC8CF022C510284B70736049E1F98C4EDA18651C7F7A3B7F6E1DEF782F4F89E8FB2
                    Malicious:false
                    Preview:MSCF............D................F...............B..........d.......................environment.xml.........CKu.]..0....8.K..:1..]d..A...... .F..9/.G.....hF.U....U.[....{F.D<(...T..h5.....Bz.=.a..6......Y...H..u...UY.......g.E...U...T.SM.%n..w......B.=.e....j.fZ.....YY....0.B...*.H........B.0.B....1.0...`.H.e......0....+.....7......0..0V..+.....7....H.......$f.....`..41200..+.....7...1". D.!....(....i..#_..cZ...Ei?..ui010...`.H.e....... K.....:U...45%.sH&V.NpH..U.........0...0..........3......9...d.......0...*.H........0~1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1(0&..U....Microsoft Update Signing CA 2.20...180712201748Z..190808201748Z0o1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1.0...U....Microsoft Update0.."0...*.H.............0.........|n.......Y..vx{<.4...*....c[.......8f...4.e.#W................V.8.;.N....9$T..=..O~..c...r..B.f........z.$........"...PM8.Yo..;.u.T\....{T...&J.
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:Microsoft Cabinet archive data, single, 8785 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 36571, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
                    Category:dropped
                    Size (bytes):25457
                    Entropy (8bit):7.655665945183416
                    Encrypted:false
                    SSDEEP:384:i9eD3oXHzqAAteICxU2L/l/dVCmMMx2GCq3fQkclmIO+WccCuqvXolUjx2:3AhAteHq2L/l/dkMxjCgF+WcmqvS
                    MD5:9D27F0ECE5019003D4415EB80973B81A
                    SHA1:39C19D8842C0201FD203F6D1EA79CEBD2E880970
                    SHA-256:331D51A091FFA84C2959F2A5971EEC6EC976F00B84473E4861D72CBED4C97203
                    SHA-512:8DF4CBDF4248743F50DFB41B0E6CC94C61227505288B23742EA0E9C86A8FA71D2AA84621D094D867C91BA4B551256E7FDD28ADE5ABA6C23F68CD80A4768922E1
                    Malicious:false
                    Preview:MSCF....Q"......D..........................Q".. A..........d........C..............environment.cab...o..!.CCK.Z.8U[.?...)..).s.Jf2.2d.1..R8..Bf...2....Q...)S.JR.P.F...{..~.}.}....g.5...?........1@![?......B...d.l......X...g.^.....@...I......+F......4*T..R...:J...C>.\.x.M$..9j._5#._.D=;....8-%<.JQ....R`D..D.0.2/....B.t........A,=.=..R.T..53.8........K..........>..m';^..#O3..h5|h.U.......HP."[.'Sl.|.c..Y.B....i.....Sx.O..r(d..J.K.)..UM0(.I....Y......0(........C.P....H.F....:.C....G.....x.tC.V..Q$....."...J.l...p..XZ/.E'.pX...^....%i.B....`.O.}=W..~NV...W..!n.1m.C.).FX.!.82.......?..aP..J.<*...R=D.lon......%.7.$....F.|*.......,.R..X{:.].c.\.....J.*.};[.7W[$3..YCLE....p.t..*.y..yXc...^.{..N.......c.j.>....(..B..tdHI@..B.H.QI3.(.H.......>z.n{}.?...A.w..$=..%....0.(0.].IR..)rLcCN.......[./...l...*gB..%..>0.v.p..Y.......o...76...".d..6>i.L...H&......2....q.{..h..WL...C.r..Z..n.L.T..^5..%.o.....u^.G.6...3.L.p......2A.*Im._Z......;.2.}z..2
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):840878
                    Entropy (8bit):3.4224066455051885
                    Encrypted:false
                    SSDEEP:3072:xJQGb/6IPolY/OhyIGmZkzTMWcnqgspmTbQiIJEDc3dv+eBrq2Bw+1wQ5xcEkc7+:01nqgsp2gOKih3
                    MD5:D3ED23A3E63ACA8CF656C585568DA6D7
                    SHA1:1A499D7E9A030D53B2A4DBD36F6F14B6531A6094
                    SHA-256:AE5A6E258A41298BE6CF2B3DA812E992E1D6A3C7FBC7DD4AA8B413DA850E8B65
                    SHA-512:21E2953B0819567865DA9C80A7D07021D7ED48F4BA3CD843C42D13D18E0E8FB27FA2F7C4EC86D4A1F4D887146F0F7E9E05B6A53D85398EA43240C2E180D52E00
                    Malicious:false
                    Preview:........[.P.e.r.f.l.i.b.].....B.a.s.e. .I.n.d.e.x.=.1.8.4.7.....L.a.s.t. .C.o.u.n.t.e.r.=.1.0.1.2.2.....L.a.s.t. .H.e.l.p.=.1.0.1.2.3.........[.P.E.R.F._...N.E.T. .C.L.R. .D.a.t.a.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.4.0.....F.i.r.s.t. .H.e.l.p.=.6.8.4.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.5.2.....L.a.s.t. .H.e.l.p.=.6.8.5.3.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.2.8.....F.i.r.s.t. .H.e.l.p.=.6.8.2.9.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.3.8.....L.a.s.t. .H.e.l.p.=.6.8.3.9.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g. .4...0...0...0.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.9.0.0.....F.i.r.s.t. .H.e.l.p.=.6.9.0.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.9.2.6.....L.a.s.t. .H.e.l.p.=.6.9.2.7.........[.P.E.R.F._...N.E.T. .D.a.t.a. .P.r.o.v.i.d.e.r. .f.o.r. .O.r.a.c.l.e.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.8.9.1.6.....F.i.r.s.t. .H.e.l.p.=.8.9.1.7.....L.a.s.t. .C.o.u.n.t.e.r.=.8.9.4.4.....L.a.s.t. .H.e.l.p.=.8.9.4.5.........[.P.E.R.F._...N.E.
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):840878
                    Entropy (8bit):3.4224066455051885
                    Encrypted:false
                    SSDEEP:3072:xJQGb/6IPolY/OhyIGmZkzTMWcnqgspmTbQiIJEDc3dv+eBrq2Bw+1wQ5xcEkc7+:01nqgsp2gOKih3
                    MD5:D3ED23A3E63ACA8CF656C585568DA6D7
                    SHA1:1A499D7E9A030D53B2A4DBD36F6F14B6531A6094
                    SHA-256:AE5A6E258A41298BE6CF2B3DA812E992E1D6A3C7FBC7DD4AA8B413DA850E8B65
                    SHA-512:21E2953B0819567865DA9C80A7D07021D7ED48F4BA3CD843C42D13D18E0E8FB27FA2F7C4EC86D4A1F4D887146F0F7E9E05B6A53D85398EA43240C2E180D52E00
                    Malicious:false
                    Preview:........[.P.e.r.f.l.i.b.].....B.a.s.e. .I.n.d.e.x.=.1.8.4.7.....L.a.s.t. .C.o.u.n.t.e.r.=.1.0.1.2.2.....L.a.s.t. .H.e.l.p.=.1.0.1.2.3.........[.P.E.R.F._...N.E.T. .C.L.R. .D.a.t.a.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.4.0.....F.i.r.s.t. .H.e.l.p.=.6.8.4.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.5.2.....L.a.s.t. .H.e.l.p.=.6.8.5.3.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.2.8.....F.i.r.s.t. .H.e.l.p.=.6.8.2.9.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.3.8.....L.a.s.t. .H.e.l.p.=.6.8.3.9.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g. .4...0...0...0.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.9.0.0.....F.i.r.s.t. .H.e.l.p.=.6.9.0.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.9.2.6.....L.a.s.t. .H.e.l.p.=.6.9.2.7.........[.P.E.R.F._...N.E.T. .D.a.t.a. .P.r.o.v.i.d.e.r. .f.o.r. .O.r.a.c.l.e.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.8.9.1.6.....F.i.r.s.t. .H.e.l.p.=.8.9.1.7.....L.a.s.t. .C.o.u.n.t.e.r.=.8.9.4.4.....L.a.s.t. .H.e.l.p.=.8.9.4.5.........[.P.E.R.F._...N.E.
                    Process:C:\Windows\System32\SIHClient.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):338
                    Entropy (8bit):3.4572760797322735
                    Encrypted:false
                    SSDEEP:6:kK3j3C83yJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:L3CCxkPlE99SCQl2DUevat
                    MD5:3B2093D06BE7F680F65CF88E972A6291
                    SHA1:0CB99A905DC6E98AE8A49F3662FE0D9DFD0571F7
                    SHA-256:A02CC96864A37AF53B32667070652451C9C4767982EFE347BEC1EA5AF8CA8DA9
                    SHA-512:CE649D6583D215E9087526F8AE0CA7A3EE1BBA909CEA62D3086D3662BDC892E747A00F5130F4095A32E3362089710A50D5800C3BADC4E9FAE783C55558B41C73
                    Malicious:false
                    Preview:p...... ........q....!..(.................................................L#... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):137550
                    Entropy (8bit):3.409189992022338
                    Encrypted:false
                    SSDEEP:1536:X1i4nfw8ld9+mRDaUR28oV7TYfXLi7NwrgSwNu56FRtg:XBnfw8ld9+mRDaUR28oV7TY+7S0ba
                    MD5:084B771A167854C5B38E25D4E199B637
                    SHA1:AE6D36D4EC5A9E515E8735525BD80C96AC0F8122
                    SHA-256:B3CF0050FAF325C36535D665C24411F3877E3667904DFE9D8A1C802ED4BCD56D
                    SHA-512:426C15923F54EC93F22D9523B5CB6D326F727A34F5FF2BDE63D1CB3AD97CAB7E5B2ABABBC6ED5082B5E3140E9342A4E6F354359357A3F9AEF285278CB38A5835
                    Malicious:false
                    Preview:1...1.8.4.7...2...S.y.s.t.e.m...4...M.e.m.o.r.y...6...%. .P.r.o.c.e.s.s.o.r. .T.i.m.e...1.0...F.i.l.e. .R.e.a.d. .O.p.e.r.a.t.i.o.n.s./.s.e.c...1.2...F.i.l.e. .W.r.i.t.e. .O.p.e.r.a.t.i.o.n.s./.s.e.c...1.4...F.i.l.e. .C.o.n.t.r.o.l. .O.p.e.r.a.t.i.o.n.s./.s.e.c...1.6...F.i.l.e. .R.e.a.d. .B.y.t.e.s./.s.e.c...1.8...F.i.l.e. .W.r.i.t.e. .B.y.t.e.s./.s.e.c...2.0...F.i.l.e. .C.o.n.t.r.o.l. .B.y.t.e.s./.s.e.c...2.4...A.v.a.i.l.a.b.l.e. .B.y.t.e.s...2.6...C.o.m.m.i.t.t.e.d. .B.y.t.e.s...2.8...P.a.g.e. .F.a.u.l.t.s./.s.e.c...3.0...C.o.m.m.i.t. .L.i.m.i.t...3.2...W.r.i.t.e. .C.o.p.i.e.s./.s.e.c...3.4...T.r.a.n.s.i.t.i.o.n. .F.a.u.l.t.s./.s.e.c...3.6...C.a.c.h.e. .F.a.u.l.t.s./.s.e.c...3.8...D.e.m.a.n.d. .Z.e.r.o. .F.a.u.l.t.s./.s.e.c...4.0...P.a.g.e.s./.s.e.c...4.2...P.a.g.e. .R.e.a.d.s./.s.e.c...4.4...P.r.o.c.e.s.s.o.r. .Q.u.e.u.e. .L.e.n.g.t.h...4.6...T.h.r.e.a.d. .S.t.a.t.e...4.8...P.a.g.e.s. .O.u.t.p.u.t./.s.e.c...5.0...P.a.g.e. .W.r.i.t.e.s./.s.e.c...5.2...B.r.o.w.s.e.r...5.4...A.n.n.o.u.
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):715050
                    Entropy (8bit):3.278818886805871
                    Encrypted:false
                    SSDEEP:3072:NUdGNuowE4j0PrRZnpETMDZ8M6d0PHHx643/A5BK9YXdhPHlVziwC4ALWI1dnmRh:78M6d0w+WB6I
                    MD5:342BC94F85E143BE85B5B997163A0BB3
                    SHA1:8780CD88D169AE88C843E19239D9A32625F6A73E
                    SHA-256:F7D40B4FADA44B2A5231780F99C3CE784BCF33866B59D5EB767EEA8E532AD2C4
                    SHA-512:0A4ED9104CAFCE95E204B5505181816E7AA7941DED2694FF75EFABAAB821BF0F0FE5B32261ED213C710250B7845255F4E317D86A3A6D4C2C21F866207233C57E
                    Malicious:false
                    Preview:3...T.h.e. .S.y.s.t.e.m. .p.e.r.f.o.r.m.a.n.c.e. .o.b.j.e.c.t. .c.o.n.s.i.s.t.s. .o.f. .c.o.u.n.t.e.r.s. .t.h.a.t. .a.p.p.l.y. .t.o. .m.o.r.e. .t.h.a.n. .o.n.e. .i.n.s.t.a.n.c.e. .o.f. .a. .c.o.m.p.o.n.e.n.t. .p.r.o.c.e.s.s.o.r.s. .o.n. .t.h.e. .c.o.m.p.u.t.e.r.....5...T.h.e. .M.e.m.o.r.y. .p.e.r.f.o.r.m.a.n.c.e. .o.b.j.e.c.t. . .c.o.n.s.i.s.t.s. .o.f. .c.o.u.n.t.e.r.s. .t.h.a.t. .d.e.s.c.r.i.b.e. .t.h.e. .b.e.h.a.v.i.o.r. .o.f. .p.h.y.s.i.c.a.l. .a.n.d. .v.i.r.t.u.a.l. .m.e.m.o.r.y. .o.n. .t.h.e. .c.o.m.p.u.t.e.r... . .P.h.y.s.i.c.a.l. .m.e.m.o.r.y. .i.s. .t.h.e. .a.m.o.u.n.t. .o.f. .r.a.n.d.o.m. .a.c.c.e.s.s. .m.e.m.o.r.y. .o.n. .t.h.e. .c.o.m.p.u.t.e.r... . .V.i.r.t.u.a.l. .m.e.m.o.r.y. .c.o.n.s.i.s.t.s. .o.f. .t.h.e. .s.p.a.c.e. .i.n. .p.h.y.s.i.c.a.l. .m.e.m.o.r.y. .a.n.d. .o.n. .d.i.s.k... . .M.a.n.y. .o.f. .t.h.e. .m.e.m.o.r.y. .c.o.u.n.t.e.r.s. .m.o.n.i.t.o.r. .p.a.g.i.n.g.,. .w.h.i.c.h. .i.s. .t.h.e. .m.o.v.e.m.e.n.t. .o.f. .p.a.g.e.s. .o.f. .c.o.d.e. .a.n.d. .d.a.t.a. .b.e.t.
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3444
                    Entropy (8bit):5.011954215267298
                    Encrypted:false
                    SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                    MD5:B133A676D139032A27DE3D9619E70091
                    SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                    SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                    SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                    Malicious:false
                    Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                    Process:C:\Windows\System32\wbem\WMIADAP.exe
                    File Type:Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
                    Category:dropped
                    Size (bytes):48786
                    Entropy (8bit):3.5854495362228453
                    Encrypted:false
                    SSDEEP:384:esozoNc1+12zG1+b61ubSGMLVrj4+PtC81ZBg4Lg4ung4og4uo91K91zI91K91z2:esozozBg4Lg4ung4og4uWG4MG4o1
                    MD5:DF877BEC5C9E3382E94FEA48FEE049AC
                    SHA1:1D61436C8A1C057C1B1089EB794D90EE4B0D8FE9
                    SHA-256:7F0F3FA64E41A30BACA377B6399F8F7087BC54DA9FCA876BFDC2C2EEECA8454B
                    SHA-512:433CB16EBE2292CB60CB8CE71207EBB752295FB73E6D13E215E771EC5FC433EE29577AF28641255810C18078B95F04A9D37734B6F49CB6A6302821E365672205
                    Malicious:false
                    Preview:.././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././....././....././. .C.o.p.y.r.i.g.h.t. .(.C.). .2.0.0.0. .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n....././....././. .M.o.d.u.l.e. .N.a.m.e.:....././. .W.m.i.A.p.R.p.l....././....././. .A.b.s.t.r.a.c.t.:....././....././. .D.e.s.c.r.i.b.e.s. .a.l.l. .t.h.e. .c.o.u.n.t.e.r.s. .s.u.p.p.o.r.t.e.d. .v.i.a. .W.M.I. .H.i.-.P.e.r.f.o.r.m.a.n.c.e. .p.r.o.v.i.d.e.r.s....././....././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.............[.i.n.f.o.].....d.r.i.v.e.r.n.a.m.e.=.W.m.i.A.p.R.p.l.....s.y.m.b.o.l.f.i.l.e.=.W.m.i.A.p.R.p.l...h.........[.l.a.n.g.u.a.g.e.s.].....0.0.9.=.E.n.g.l.i.s.h.....0.0.9.=.E.n.g.l.i.s.h.........[.o.b.j.e.c.t.s.].....W.M.I._.O.b.j.e.c.t.s._.0.0.
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                    Entropy (8bit):7.980154210740673
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:rCOTA____OMAGNA.exe
                    File size:780'152 bytes
                    MD5:e8ae37869c7ad38c37445c1e16c7a065
                    SHA1:afdf5240a81479a5b020c0432741c203bc0bec01
                    SHA256:24b9d2af5baedd2f1a03ccce703c5a79251c10783108ab7a1816d24e464e64ce
                    SHA512:0f9f99da508d08abd99acf5c63902ced13e8ecb570ed4ae486a05db9fef34ed03cf22a5d1d871ba0a1e2525e965889f62a01ec4ce2e12d1e25c11b35e0f8407b
                    SSDEEP:12288:BbMwYfOZx/q6FWhW37KrtJXjABachoWeEhVV5r0B5H1lMZafL14rBdeaBLFO7Sbd:BbMwYfOZxvEI7oJXn5W3VPoH1lMY69dD
                    TLSH:7BF4230501F3F273DA1287B7D6A632737ED6EC10D9656B0713843F89B5332522B2AAC5
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                    Icon Hash:55888ac7c7a3a6a5
                    Entrypoint:0x40352d
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                    Signature Valid:false
                    Signature Issuer:E=Flonellen@Skalarumbillede.Anh, OU="Yderverdner Vintages assault ", O=letoplselig, L=West Winterslow, S=England, C=GB
                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                    Error Number:-2146762487
                    Not Before, Not After
                    • 01/06/2023 01:39:19 31/05/2026 01:39:19
                    Subject Chain
                    • E=Flonellen@Skalarumbillede.Anh, OU="Yderverdner Vintages assault ", O=letoplselig, L=West Winterslow, S=England, C=GB
                    Version:3
                    Thumbprint MD5:28B3835575177F0EB124DB23AF2038A4
                    Thumbprint SHA-1:38EA825BE1A69DCE88A0027345CCA63D8BBB3A60
                    Thumbprint SHA-256:0C33750978455AF8D57BDDBC37753D78A266E517835E658845E4407829DD31DB
                    Serial:066F65D7246347A103C83912288CD38CE70965D8
                    Instruction
                    push ebp
                    mov ebp, esp
                    sub esp, 000003F4h
                    push ebx
                    push esi
                    push edi
                    push 00000020h
                    pop edi
                    xor ebx, ebx
                    push 00008001h
                    mov dword ptr [ebp-14h], ebx
                    mov dword ptr [ebp-04h], 0040A2E0h
                    mov dword ptr [ebp-10h], ebx
                    call dword ptr [004080CCh]
                    mov esi, dword ptr [004080D0h]
                    lea eax, dword ptr [ebp-00000140h]
                    push eax
                    mov dword ptr [ebp-0000012Ch], ebx
                    mov dword ptr [ebp-2Ch], ebx
                    mov dword ptr [ebp-28h], ebx
                    mov dword ptr [ebp-00000140h], 0000011Ch
                    call esi
                    test eax, eax
                    jne 00007FBCBCF9A91Ah
                    lea eax, dword ptr [ebp-00000140h]
                    mov dword ptr [ebp-00000140h], 00000114h
                    push eax
                    call esi
                    mov ax, word ptr [ebp-0000012Ch]
                    mov ecx, dword ptr [ebp-00000112h]
                    sub ax, 00000053h
                    add ecx, FFFFFFD0h
                    neg ax
                    sbb eax, eax
                    mov byte ptr [ebp-26h], 00000004h
                    not eax
                    and eax, ecx
                    mov word ptr [ebp-2Ch], ax
                    cmp dword ptr [ebp-0000013Ch], 0Ah
                    jnc 00007FBCBCF9A8EAh
                    and word ptr [ebp-00000132h], 0000h
                    mov eax, dword ptr [ebp-00000134h]
                    movzx ecx, byte ptr [ebp-00000138h]
                    mov dword ptr [00434FB8h], eax
                    xor eax, eax
                    mov ah, byte ptr [ebp-0000013Ch]
                    movzx eax, ax
                    or eax, ecx
                    xor ecx, ecx
                    mov ch, byte ptr [ebp-2Ch]
                    movzx ecx, cx
                    shl eax, 10h
                    or eax, ecx
                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x16d8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0xbc5100x2268
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x68970x6a00False0.6661261792452831data6.458398214928006IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x80000x14a60x1600False0.4392755681818182data5.024109281264143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xa0000x2b0180x600False0.521484375data4.15458210408643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .ndata0x360000x240000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x5a0000x16d80x1800False0.31689453125data4.172010041710146IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_BITMAP0x5a2b00x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                    RT_ICON0x5a6180x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.20809248554913296
                    RT_DIALOG0x5ab800x144dataEnglishUnited States0.5216049382716049
                    RT_DIALOG0x5acc80x13cdataEnglishUnited States0.5506329113924051
                    RT_DIALOG0x5ae080x100dataEnglishUnited States0.5234375
                    RT_DIALOG0x5af080x11cdataEnglishUnited States0.6056338028169014
                    RT_DIALOG0x5b0280xc4dataEnglishUnited States0.5918367346938775
                    RT_DIALOG0x5b0f00x60dataEnglishUnited States0.7291666666666666
                    RT_GROUP_ICON0x5b1500x14dataEnglishUnited States1.1
                    RT_VERSION0x5b1680x230dataEnglishUnited States0.5392857142857143
                    RT_MANIFEST0x5b3980x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                    DLLImport
                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:11:28:35
                    Start date:28/11/2023
                    Path:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\rCOTA____OMAGNA.exe
                    Imagebase:0x400000
                    File size:780'152 bytes
                    MD5 hash:E8AE37869C7AD38C37445C1E16C7A065
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4466934808.0000000002B6D000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Target ID:2
                    Start time:11:28:36
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:11:28:36
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:11:28:36
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x98^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:11:28:36
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:11:28:36
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:7
                    Start time:11:28:37
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:8
                    Start time:11:28:37
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:9
                    Start time:11:28:37
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:10
                    Start time:11:28:37
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD8^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:11
                    Start time:11:28:37
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:12
                    Start time:11:28:37
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD9^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:13
                    Start time:11:28:37
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:14
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:15
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:16
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:17
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:18
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xB8^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:19
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:20
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x83^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:21
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:22
                    Start time:11:28:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x84^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:23
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:24
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9C^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:25
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:26
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xBC^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:27
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:28
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:29
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:30
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x85^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:31
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:32
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:33
                    Start time:11:28:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:34
                    Start time:11:28:40
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x84^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:35
                    Start time:11:28:40
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:36
                    Start time:11:28:40
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9C^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:37
                    Start time:11:28:40
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:38
                    Start time:11:28:40
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:39
                    Start time:11:28:40
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:40
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:41
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:42
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:43
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:44
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDC^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:45
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:46
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:47
                    Start time:11:28:41
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:48
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:49
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:50
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:51
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:52
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:53
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:54
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x92^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:55
                    Start time:11:28:42
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:56
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x86^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:57
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:58
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x98^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:59
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:60
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9D^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:61
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:62
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x88^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:63
                    Start time:11:28:43
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:64
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:65
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:66
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:67
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:68
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC5^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:69
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:70
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:71
                    Start time:11:28:44
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:72
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:73
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:74
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:75
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:76
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:77
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:78
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:79
                    Start time:11:28:45
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:80
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xB4^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:81
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:82
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x84^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:83
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:84
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9B^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:85
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:86
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:87
                    Start time:11:28:46
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:88
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x85^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:89
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:90
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:91
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:92
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x86^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:93
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:94
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:95
                    Start time:11:28:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:96
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:97
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:98
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDF^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:99
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:100
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:101
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:102
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:103
                    Start time:11:28:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:104
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:105
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:106
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:107
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:108
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:109
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:110
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:111
                    Start time:11:28:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:112
                    Start time:11:28:50
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x93^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:113
                    Start time:11:28:50
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:114
                    Start time:11:28:50
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:115
                    Start time:11:28:50
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:116
                    Start time:11:28:50
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:117
                    Start time:11:28:50
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:118
                    Start time:11:28:52
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:119
                    Start time:11:28:52
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:120
                    Start time:11:28:52
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:121
                    Start time:11:28:52
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:122
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:123
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:124
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:125
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:126
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:127
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:128
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:129
                    Start time:11:28:53
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:130
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\SIHClient.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\sihclient.exe /cv AZQPdMkTL0SlnyG2qylUew.0.2
                    Imagebase:0x7ff6cb330000
                    File size:380'720 bytes
                    MD5 hash:8BE47315BF30475EEECE8E39599E9273
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:131
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:132
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:133
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x93^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:134
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:135
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:136
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:137
                    Start time:11:28:54
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:138
                    Start time:11:28:55
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:139
                    Start time:11:28:55
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:140
                    Start time:11:28:55
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:141
                    Start time:11:28:55
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:142
                    Start time:11:28:55
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:143
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:144
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:145
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC5^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:146
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:147
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:148
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:149
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDE^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:150
                    Start time:11:28:56
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:151
                    Start time:11:28:57
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x92^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:152
                    Start time:11:28:57
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:153
                    Start time:11:28:57
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xA0^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:154
                    Start time:11:28:57
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:155
                    Start time:11:28:57
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xAE^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:156
                    Start time:11:28:57
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:157
                    Start time:11:28:58
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xB9^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:158
                    Start time:11:28:58
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:159
                    Start time:11:28:58
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xA5^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:160
                    Start time:11:28:58
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:161
                    Start time:11:28:58
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xAE^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:162
                    Start time:11:28:58
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:163
                    Start time:11:28:58
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xA7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:164
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:165
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD8^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:166
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:167
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD9^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:168
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:169
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:170
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:171
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:172
                    Start time:11:28:59
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:173
                    Start time:11:29:00
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xBD^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:174
                    Start time:11:29:00
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:175
                    Start time:11:29:00
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:176
                    Start time:11:29:00
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:177
                    Start time:11:29:00
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:178
                    Start time:11:29:00
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:179
                    Start time:11:29:00
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:180
                    Start time:11:29:01
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:181
                    Start time:11:29:01
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:182
                    Start time:11:29:01
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:183
                    Start time:11:29:01
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8A^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:184
                    Start time:11:29:01
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:185
                    Start time:11:29:01
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:186
                    Start time:11:29:01
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:187
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xAA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:188
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:189
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:190
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:191
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:192
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:193
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x84^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:194
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:195
                    Start time:11:29:02
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x88^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:196
                    Start time:11:29:03
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:197
                    Start time:11:29:03
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xAE^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:198
                    Start time:11:29:03
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:199
                    Start time:11:29:03
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x93^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:200
                    Start time:11:29:03
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:201
                    Start time:11:29:03
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:202
                    Start time:11:29:03
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:203
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:204
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:205
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:206
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:207
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC6^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:208
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:209
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:210
                    Start time:11:29:04
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:211
                    Start time:11:29:05
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:212
                    Start time:11:29:05
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:213
                    Start time:11:29:05
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:214
                    Start time:11:29:05
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:215
                    Start time:11:29:05
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:216
                    Start time:11:29:05
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:217
                    Start time:11:29:05
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:218
                    Start time:11:29:06
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:219
                    Start time:11:29:06
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:220
                    Start time:11:29:06
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:221
                    Start time:11:29:06
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:222
                    Start time:11:29:06
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:223
                    Start time:11:29:06
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:224
                    Start time:11:29:06
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:225
                    Start time:11:29:07
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:226
                    Start time:11:29:07
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:227
                    Start time:11:29:07
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:228
                    Start time:11:29:07
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:229
                    Start time:11:29:07
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD9^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:230
                    Start time:11:29:08
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:231
                    Start time:11:29:08
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:232
                    Start time:11:29:08
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:233
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:234
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:235
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:236
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:237
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:238
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:239
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:240
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:241
                    Start time:11:29:10
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD9^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:242
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:243
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:244
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:245
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:246
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:247
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:248
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:249
                    Start time:11:29:11
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:250
                    Start time:11:29:12
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:251
                    Start time:11:29:12
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:252
                    Start time:11:29:12
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:253
                    Start time:11:29:12
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x93^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:254
                    Start time:11:29:12
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:255
                    Start time:11:29:12
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD8^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:256
                    Start time:11:29:12
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:257
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:258
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:259
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:260
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:261
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x7ff6a5670000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:262
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:263
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:264
                    Start time:11:29:13
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:265
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:266
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:267
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:268
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:269
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:270
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:271
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDD^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:272
                    Start time:11:29:14
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:273
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDF^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:274
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:275
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:276
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:277
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9B^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:278
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:279
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC5^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:280
                    Start time:11:29:15
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7e52b0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:281
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:282
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:283
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDF^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:284
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:285
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x92^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:286
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:287
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x86^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:288
                    Start time:11:29:16
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:289
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x98^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:290
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:291
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9D^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:292
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:293
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x88^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:294
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:295
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:296
                    Start time:11:29:17
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:297
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:298
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:299
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:300
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:301
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:302
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:303
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xB4^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:304
                    Start time:11:29:18
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:305
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:306
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:307
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x98^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:308
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:309
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:310
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:311
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:312
                    Start time:11:29:19
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:313
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x80^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:314
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:315
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:316
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:317
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:318
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:319
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:320
                    Start time:11:29:20
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:321
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:322
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:323
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDE^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:324
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:325
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:326
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:327
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:328
                    Start time:11:29:21
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:329
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:330
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:331
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:332
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7ae440000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:333
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\System32\wbem\WMIADAP.exe
                    Wow64 process (32bit):false
                    Commandline:wmiadap.exe /F /T /R
                    Imagebase:0x7ff75df30000
                    File size:182'272 bytes
                    MD5 hash:1BFFABBD200C850E6346820E92B915DC
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:334
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD8^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:335
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:336
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:337
                    Start time:11:29:22
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:338
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:339
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:340
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:341
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:342
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:343
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:344
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:345
                    Start time:11:29:23
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:346
                    Start time:11:29:24
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:347
                    Start time:11:29:24
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:348
                    Start time:11:29:24
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0xab0000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:349
                    Start time:11:29:24
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:350
                    Start time:11:29:24
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:351
                    Start time:11:29:24
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:352
                    Start time:11:29:25
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:353
                    Start time:11:29:25
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:354
                    Start time:11:29:25
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:355
                    Start time:11:29:25
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:356
                    Start time:11:29:26
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:357
                    Start time:11:29:26
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:358
                    Start time:11:29:27
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC5^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:359
                    Start time:11:29:27
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:360
                    Start time:11:29:27
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:361
                    Start time:11:29:27
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:362
                    Start time:11:29:27
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDC^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:363
                    Start time:11:29:27
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:364
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x92^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:365
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:366
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x86^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:367
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:368
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x98^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:369
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:370
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9D^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:371
                    Start time:11:29:28
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:372
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x88^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:373
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:374
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:375
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:376
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:377
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:378
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC5^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:379
                    Start time:11:29:29
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:380
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:381
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:382
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:383
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:384
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:385
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:386
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:387
                    Start time:11:29:30
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:388
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:389
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:390
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xB4^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:391
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:392
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:393
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:394
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:395
                    Start time:11:29:31
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:396
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8A^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:397
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:398
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:399
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:400
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:401
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:402
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:403
                    Start time:11:29:32
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:404
                    Start time:11:29:33
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:405
                    Start time:11:29:33
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:406
                    Start time:11:29:33
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:407
                    Start time:11:29:33
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:408
                    Start time:11:29:33
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDE^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:409
                    Start time:11:29:33
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:410
                    Start time:11:29:34
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:411
                    Start time:11:29:34
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:412
                    Start time:11:29:34
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:413
                    Start time:11:29:34
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:414
                    Start time:11:29:34
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:415
                    Start time:11:29:34
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:416
                    Start time:11:29:34
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:417
                    Start time:11:29:35
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:418
                    Start time:11:29:35
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:419
                    Start time:11:29:35
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:420
                    Start time:11:29:35
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDF^235"
                    Imagebase:0x7ff6bcc30000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:421
                    Start time:11:29:35
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:422
                    Start time:11:29:35
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:423
                    Start time:11:29:35
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:424
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:425
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:426
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:427
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:428
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:429
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:430
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:431
                    Start time:11:29:36
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:432
                    Start time:11:29:37
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD9^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:433
                    Start time:11:29:37
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:434
                    Start time:11:29:37
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:435
                    Start time:11:29:37
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:436
                    Start time:11:29:37
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:437
                    Start time:11:29:37
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:438
                    Start time:11:29:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD3^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:439
                    Start time:11:29:38
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:440
                    Start time:11:29:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:441
                    Start time:11:29:38
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:442
                    Start time:11:29:38
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:443
                    Start time:11:29:38
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:444
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD9^235"
                    Imagebase:0x7ff7e52b0000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:445
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:446
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:447
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:448
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x92^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:449
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:450
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:451
                    Start time:11:29:39
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:452
                    Start time:11:29:40
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x98^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:453
                    Start time:11:29:40
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:454
                    Start time:11:29:40
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8E^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:455
                    Start time:11:29:40
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:456
                    Start time:11:29:40
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:457
                    Start time:11:29:40
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:458
                    Start time:11:29:40
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD8^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:459
                    Start time:11:29:41
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:460
                    Start time:11:29:41
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD9^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:461
                    Start time:11:29:41
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:462
                    Start time:11:29:41
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:463
                    Start time:11:29:41
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:464
                    Start time:11:29:41
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xD1^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:465
                    Start time:11:29:42
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:466
                    Start time:11:29:42
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xA8^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:467
                    Start time:11:29:42
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:468
                    Start time:11:29:42
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8A^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:469
                    Start time:11:29:42
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:470
                    Start time:11:29:42
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:471
                    Start time:11:29:43
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:472
                    Start time:11:29:44
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x87^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:473
                    Start time:11:29:44
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:474
                    Start time:11:29:45
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xBC^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:475
                    Start time:11:29:45
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:476
                    Start time:11:29:45
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:477
                    Start time:11:29:45
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:478
                    Start time:11:29:45
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x85^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:479
                    Start time:11:29:45
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:480
                    Start time:11:29:46
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x8F^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:481
                    Start time:11:29:46
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:482
                    Start time:11:29:46
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x84^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:483
                    Start time:11:29:46
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:484
                    Start time:11:29:46
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x9C^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:485
                    Start time:11:29:46
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:486
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xBB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:487
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:488
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:489
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:490
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x84^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:491
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:492
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x88^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:493
                    Start time:11:29:47
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:494
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xAA^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:495
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:496
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC3^235"
                    Imagebase:0x7ff67e650000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:497
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:498
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:499
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:500
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:501
                    Start time:11:29:48
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:502
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x99^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:503
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:504
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDF^235"
                    Imagebase:0x7ff6bcc30000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:505
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:506
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:507
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:508
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:509
                    Start time:11:29:49
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:510
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:511
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:512
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:513
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:514
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:515
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:516
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:517
                    Start time:11:29:50
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:518
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:519
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:520
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:521
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:522
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:523
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:524
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:525
                    Start time:11:29:51
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:526
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:527
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:528
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0xab0000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:529
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:530
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:531
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:532
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:533
                    Start time:11:29:52
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:534
                    Start time:11:29:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC7^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:535
                    Start time:11:29:53
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:536
                    Start time:11:29:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:537
                    Start time:11:29:53
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:538
                    Start time:11:29:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x82^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:539
                    Start time:11:29:53
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:540
                    Start time:11:29:53
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xCB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:541
                    Start time:11:29:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:542
                    Start time:11:29:54
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xDB^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:543
                    Start time:11:29:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:544
                    Start time:11:29:54
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0xC2^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:545
                    Start time:11:29:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:546
                    Start time:11:29:54
                    Start date:28/11/2023
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd /c set /a "0x92^235"
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:547
                    Start time:11:29:54
                    Start date:28/11/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:21.2%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:16.2%
                      Total number of Nodes:1568
                      Total number of Limit Nodes:43
                      execution_graph 3923 401941 3924 401943 3923->3924 3929 402da6 3924->3929 3930 402db2 3929->3930 3975 40657a 3930->3975 3933 401948 3935 405c49 3933->3935 4017 405f14 3935->4017 3938 405c71 DeleteFileW 3940 401951 3938->3940 3939 405c88 3942 405db3 3939->3942 4031 40653d lstrcpynW 3939->4031 3942->3940 4060 406873 FindFirstFileW 3942->4060 3943 405cae 3944 405cc1 3943->3944 3945 405cb4 lstrcatW 3943->3945 4032 405e58 lstrlenW 3944->4032 3946 405cc7 3945->3946 3949 405cd7 lstrcatW 3946->3949 3950 405ccd 3946->3950 3952 405ce2 lstrlenW FindFirstFileW 3949->3952 3950->3949 3950->3952 3954 405da8 3952->3954 3973 405d04 3952->3973 3953 405dd1 4063 405e0c lstrlenW CharPrevW 3953->4063 3954->3942 3957 405d8b FindNextFileW 3960 405da1 FindClose 3957->3960 3957->3973 3958 405c01 5 API calls 3961 405de3 3958->3961 3960->3954 3962 405de7 3961->3962 3963 405dfd 3961->3963 3962->3940 3966 40559f 24 API calls 3962->3966 3965 40559f 24 API calls 3963->3965 3965->3940 3968 405df4 3966->3968 3967 405c49 60 API calls 3967->3973 3969 4062fd 36 API calls 3968->3969 3971 405dfb 3969->3971 3970 40559f 24 API calls 3970->3957 3971->3940 3973->3957 3973->3967 3973->3970 4036 40653d lstrcpynW 3973->4036 4037 405c01 3973->4037 4045 40559f 3973->4045 4056 4062fd MoveFileExW 3973->4056 3977 406587 3975->3977 3976 4067aa 3978 402dd3 3976->3978 4008 40653d lstrcpynW 3976->4008 3977->3976 3980 406778 lstrlenW 3977->3980 3981 40668f GetSystemDirectoryW 3977->3981 3985 40657a 10 API calls 3977->3985 3986 4066a2 GetWindowsDirectoryW 3977->3986 3987 4067c4 5 API calls 3977->3987 3988 4066d1 SHGetSpecialFolderLocation 3977->3988 3989 406719 lstrcatW 3977->3989 3990 40657a 10 API calls 3977->3990 4001 40640b 3977->4001 4006 406484 wsprintfW 3977->4006 4007 40653d lstrcpynW 3977->4007 3978->3933 3992 4067c4 3978->3992 3980->3977 3981->3977 3985->3980 3986->3977 3987->3977 3988->3977 3991 4066e9 SHGetPathFromIDListW CoTaskMemFree 3988->3991 3989->3977 3990->3977 3991->3977 3999 4067d1 3992->3999 3993 406847 3994 40684c CharPrevW 3993->3994 3996 40686d 3993->3996 3994->3993 3995 40683a CharNextW 3995->3993 3995->3999 3996->3933 3998 406826 CharNextW 3998->3999 3999->3993 3999->3995 3999->3998 4000 406835 CharNextW 3999->4000 4013 405e39 3999->4013 4000->3995 4009 4063aa 4001->4009 4004 40643f RegQueryValueExW RegCloseKey 4005 40646f 4004->4005 4005->3977 4006->3977 4007->3977 4008->3978 4010 4063b9 4009->4010 4011 4063c2 RegOpenKeyExW 4010->4011 4012 4063bd 4010->4012 4011->4012 4012->4004 4012->4005 4014 405e3f 4013->4014 4015 405e55 4014->4015 4016 405e46 CharNextW 4014->4016 4015->3999 4016->4014 4066 40653d lstrcpynW 4017->4066 4019 405f25 4067 405eb7 CharNextW CharNextW 4019->4067 4022 405c69 4022->3938 4022->3939 4023 4067c4 5 API calls 4026 405f3b 4023->4026 4024 405f6c lstrlenW 4025 405f77 4024->4025 4024->4026 4027 405e0c 3 API calls 4025->4027 4026->4022 4026->4024 4028 406873 2 API calls 4026->4028 4030 405e58 2 API calls 4026->4030 4029 405f7c GetFileAttributesW 4027->4029 4028->4026 4029->4022 4030->4024 4031->3943 4033 405e66 4032->4033 4034 405e78 4033->4034 4035 405e6c CharPrevW 4033->4035 4034->3946 4035->4033 4035->4034 4036->3973 4073 406008 GetFileAttributesW 4037->4073 4040 405c24 DeleteFileW 4042 405c2a 4040->4042 4041 405c1c RemoveDirectoryW 4041->4042 4043 405c2e 4042->4043 4044 405c3a SetFileAttributesW 4042->4044 4043->3973 4044->4043 4046 4055ba 4045->4046 4047 40565c 4045->4047 4048 4055d6 lstrlenW 4046->4048 4049 40657a 17 API calls 4046->4049 4047->3973 4050 4055e4 lstrlenW 4048->4050 4051 4055ff 4048->4051 4049->4048 4050->4047 4052 4055f6 lstrcatW 4050->4052 4053 405612 4051->4053 4054 405605 SetWindowTextW 4051->4054 4052->4051 4053->4047 4055 405618 SendMessageW SendMessageW SendMessageW 4053->4055 4054->4053 4055->4047 4057 40631e 4056->4057 4058 406311 4056->4058 4057->3973 4076 406183 4058->4076 4061 405dcd 4060->4061 4062 406889 FindClose 4060->4062 4061->3940 4061->3953 4062->4061 4064 405dd7 4063->4064 4065 405e28 lstrcatW 4063->4065 4064->3958 4065->4064 4066->4019 4068 405ed4 4067->4068 4069 405ee6 4067->4069 4068->4069 4070 405ee1 CharNextW 4068->4070 4071 405e39 CharNextW 4069->4071 4072 405f0a 4069->4072 4070->4072 4071->4069 4072->4022 4072->4023 4074 405c0d 4073->4074 4075 40601a SetFileAttributesW 4073->4075 4074->4040 4074->4041 4074->4043 4075->4074 4077 4061b3 4076->4077 4078 4061d9 GetShortPathNameW 4076->4078 4103 40602d GetFileAttributesW CreateFileW 4077->4103 4079 4062f8 4078->4079 4080 4061ee 4078->4080 4079->4057 4080->4079 4083 4061f6 wsprintfA 4080->4083 4082 4061bd CloseHandle GetShortPathNameW 4082->4079 4084 4061d1 4082->4084 4085 40657a 17 API calls 4083->4085 4084->4078 4084->4079 4086 40621e 4085->4086 4104 40602d GetFileAttributesW CreateFileW 4086->4104 4088 40622b 4088->4079 4089 40623a GetFileSize GlobalAlloc 4088->4089 4090 4062f1 CloseHandle 4089->4090 4091 40625c 4089->4091 4090->4079 4105 4060b0 ReadFile 4091->4105 4096 40627b lstrcpyA 4100 40629d 4096->4100 4097 40628f 4098 405f92 4 API calls 4097->4098 4098->4100 4099 4062d4 SetFilePointer 4112 4060df WriteFile 4099->4112 4100->4099 4103->4082 4104->4088 4106 4060ce 4105->4106 4106->4090 4107 405f92 lstrlenA 4106->4107 4108 405fd3 lstrlenA 4107->4108 4109 405fdb 4108->4109 4110 405fac lstrcmpiA 4108->4110 4109->4096 4109->4097 4110->4109 4111 405fca CharNextA 4110->4111 4111->4108 4113 4060fd GlobalFree 4112->4113 4113->4090 4114 4015c1 4115 402da6 17 API calls 4114->4115 4116 4015c8 4115->4116 4117 405eb7 4 API calls 4116->4117 4129 4015d1 4117->4129 4118 401631 4120 401663 4118->4120 4121 401636 4118->4121 4119 405e39 CharNextW 4119->4129 4123 401423 24 API calls 4120->4123 4141 401423 4121->4141 4131 40165b 4123->4131 4128 40164a SetCurrentDirectoryW 4128->4131 4129->4118 4129->4119 4130 401617 GetFileAttributesW 4129->4130 4133 405b08 4129->4133 4136 405a6e CreateDirectoryW 4129->4136 4145 405aeb CreateDirectoryW 4129->4145 4130->4129 4148 40690a GetModuleHandleA 4133->4148 4137 405abb 4136->4137 4138 405abf GetLastError 4136->4138 4137->4129 4138->4137 4139 405ace SetFileSecurityW 4138->4139 4139->4137 4140 405ae4 GetLastError 4139->4140 4140->4137 4142 40559f 24 API calls 4141->4142 4143 401431 4142->4143 4144 40653d lstrcpynW 4143->4144 4144->4128 4146 405afb 4145->4146 4147 405aff GetLastError 4145->4147 4146->4129 4147->4146 4149 406930 GetProcAddress 4148->4149 4150 406926 4148->4150 4151 405b0f 4149->4151 4154 40689a GetSystemDirectoryW 4150->4154 4151->4129 4153 40692c 4153->4149 4153->4151 4155 4068bc wsprintfW LoadLibraryExW 4154->4155 4155->4153 4157 401c43 4179 402d84 4157->4179 4159 401c4a 4160 402d84 17 API calls 4159->4160 4161 401c57 4160->4161 4162 401c6c 4161->4162 4163 402da6 17 API calls 4161->4163 4164 401c7c 4162->4164 4165 402da6 17 API calls 4162->4165 4163->4162 4166 401cd3 4164->4166 4167 401c87 4164->4167 4165->4164 4168 402da6 17 API calls 4166->4168 4169 402d84 17 API calls 4167->4169 4170 401cd8 4168->4170 4171 401c8c 4169->4171 4172 402da6 17 API calls 4170->4172 4173 402d84 17 API calls 4171->4173 4175 401ce1 FindWindowExW 4172->4175 4174 401c98 4173->4174 4176 401cc3 SendMessageW 4174->4176 4177 401ca5 SendMessageTimeoutW 4174->4177 4178 401d03 4175->4178 4176->4178 4177->4178 4180 40657a 17 API calls 4179->4180 4181 402d99 4180->4181 4181->4159 5047 404943 5048 404953 5047->5048 5049 404979 5047->5049 5050 404499 18 API calls 5048->5050 5051 404500 8 API calls 5049->5051 5052 404960 SetDlgItemTextW 5050->5052 5053 404985 5051->5053 5052->5049 5054 4028c4 5055 4028ca 5054->5055 5056 4028d2 FindClose 5055->5056 5057 402c2a 5055->5057 5056->5057 5058 6e38103d 5061 6e38101b 5058->5061 5068 6e3815b6 5061->5068 5063 6e381020 5064 6e381024 5063->5064 5065 6e381027 GlobalAlloc 5063->5065 5066 6e3815dd 3 API calls 5064->5066 5065->5064 5067 6e38103b 5066->5067 5070 6e3815bc 5068->5070 5069 6e3815c2 5069->5063 5070->5069 5071 6e3815ce GlobalFree 5070->5071 5071->5063 5075 4016cc 5076 402da6 17 API calls 5075->5076 5077 4016d2 GetFullPathNameW 5076->5077 5078 4016ec 5077->5078 5084 40170e 5077->5084 5081 406873 2 API calls 5078->5081 5078->5084 5079 401723 GetShortPathNameW 5080 402c2a 5079->5080 5082 4016fe 5081->5082 5082->5084 5085 40653d lstrcpynW 5082->5085 5084->5079 5084->5080 5085->5084 5086 401e4e GetDC 5087 402d84 17 API calls 5086->5087 5088 401e60 GetDeviceCaps MulDiv ReleaseDC 5087->5088 5089 402d84 17 API calls 5088->5089 5090 401e91 5089->5090 5091 40657a 17 API calls 5090->5091 5092 401ece CreateFontIndirectW 5091->5092 5093 402638 5092->5093 5094 4045cf lstrcpynW lstrlenW 5095 402950 5096 402da6 17 API calls 5095->5096 5098 40295c 5096->5098 5097 402972 5100 406008 2 API calls 5097->5100 5098->5097 5099 402da6 17 API calls 5098->5099 5099->5097 5101 402978 5100->5101 5123 40602d GetFileAttributesW CreateFileW 5101->5123 5103 402985 5104 402a3b 5103->5104 5105 4029a0 GlobalAlloc 5103->5105 5106 402a23 5103->5106 5107 402a42 DeleteFileW 5104->5107 5108 402a55 5104->5108 5105->5106 5109 4029b9 5105->5109 5110 4032b4 31 API calls 5106->5110 5107->5108 5124 4034e5 SetFilePointer 5109->5124 5112 402a30 CloseHandle 5110->5112 5112->5104 5113 4029bf 5114 4034cf ReadFile 5113->5114 5115 4029c8 GlobalAlloc 5114->5115 5116 4029d8 5115->5116 5117 402a0c 5115->5117 5118 4032b4 31 API calls 5116->5118 5119 4060df WriteFile 5117->5119 5122 4029e5 5118->5122 5120 402a18 GlobalFree 5119->5120 5120->5106 5121 402a03 GlobalFree 5121->5117 5122->5121 5123->5103 5124->5113 5125 401956 5126 402da6 17 API calls 5125->5126 5127 40195d lstrlenW 5126->5127 5128 402638 5127->5128 5129 4014d7 5130 402d84 17 API calls 5129->5130 5131 4014dd Sleep 5130->5131 5133 402c2a 5131->5133 4791 4020d8 4792 40219c 4791->4792 4793 4020ea 4791->4793 4795 401423 24 API calls 4792->4795 4794 402da6 17 API calls 4793->4794 4796 4020f1 4794->4796 4797 4022f6 4795->4797 4798 402da6 17 API calls 4796->4798 4799 4020fa 4798->4799 4800 402110 LoadLibraryExW 4799->4800 4801 402102 GetModuleHandleW 4799->4801 4800->4792 4802 402121 4800->4802 4801->4800 4801->4802 4814 406979 4802->4814 4805 402132 4807 402151 4805->4807 4808 40213a 4805->4808 4806 40216b 4809 40559f 24 API calls 4806->4809 4819 6e381817 4807->4819 4811 401423 24 API calls 4808->4811 4810 402142 4809->4810 4810->4797 4812 40218e FreeLibrary 4810->4812 4811->4810 4812->4797 4861 40655f WideCharToMultiByte 4814->4861 4816 406996 4817 40699d GetProcAddress 4816->4817 4818 40212c 4816->4818 4817->4818 4818->4805 4818->4806 4820 6e38184a 4819->4820 4821 6e381bff 22 API calls 4820->4821 4822 6e381851 4821->4822 4823 6e381976 4822->4823 4824 6e381869 4822->4824 4825 6e381862 4822->4825 4823->4810 4862 6e382480 4824->4862 4878 6e38243e 4825->4878 4830 6e3818cd 4836 6e38191e 4830->4836 4837 6e3818d3 4830->4837 4831 6e3818af 4891 6e382655 4831->4891 4832 6e381898 4846 6e38188e 4832->4846 4888 6e382e23 4832->4888 4833 6e38187f 4835 6e381885 4833->4835 4841 6e381890 4833->4841 4835->4846 4872 6e382b98 4835->4872 4839 6e382655 10 API calls 4836->4839 4843 6e381666 2 API calls 4837->4843 4844 6e38190f 4839->4844 4840 6e3818b5 4845 6e381654 3 API calls 4840->4845 4882 6e382810 4841->4882 4848 6e3818f0 4843->4848 4852 6e381965 4844->4852 4902 6e382618 4844->4902 4850 6e3818bb 4845->4850 4846->4830 4846->4831 4849 6e382655 10 API calls 4848->4849 4849->4844 4853 6e381312 2 API calls 4850->4853 4851 6e381896 4851->4846 4852->4823 4854 6e38196f GlobalFree 4852->4854 4856 6e3818c1 GlobalFree 4853->4856 4854->4823 4856->4844 4858 6e381951 4858->4852 4860 6e3815dd 3 API calls 4858->4860 4859 6e38194a FreeLibrary 4859->4858 4860->4852 4861->4816 4869 6e382498 4862->4869 4864 6e3825c1 GlobalFree 4867 6e38186f 4864->4867 4864->4869 4865 6e38256b GlobalAlloc CLSIDFromString 4865->4864 4866 6e382540 GlobalAlloc WideCharToMultiByte 4866->4864 4867->4832 4867->4833 4867->4846 4868 6e3812cc GlobalAlloc lstrcpynW 4868->4869 4869->4864 4869->4865 4869->4866 4869->4868 4871 6e38258a 4869->4871 4906 6e38135a 4869->4906 4871->4864 4910 6e3827a4 4871->4910 4874 6e382baa 4872->4874 4873 6e382c4f _open 4877 6e382c6d 4873->4877 4874->4873 4876 6e382d39 4876->4846 4913 6e382b42 4877->4913 4879 6e382453 4878->4879 4880 6e38245e GlobalAlloc 4879->4880 4881 6e381868 4879->4881 4880->4879 4881->4824 4886 6e382840 4882->4886 4883 6e3828db GlobalAlloc 4887 6e3828fe 4883->4887 4884 6e3828ee 4885 6e3828f4 GlobalSize 4884->4885 4884->4887 4885->4887 4886->4883 4886->4884 4887->4851 4889 6e382e2e 4888->4889 4890 6e382e6e GlobalFree 4889->4890 4917 6e3812bb GlobalAlloc 4891->4917 4893 6e3826d8 MultiByteToWideChar 4898 6e38265f 4893->4898 4894 6e3826fa StringFromGUID2 4894->4898 4895 6e38270b lstrcpynW 4895->4898 4896 6e382742 GlobalFree 4896->4898 4897 6e38271e wsprintfW 4897->4898 4898->4893 4898->4894 4898->4895 4898->4896 4898->4897 4899 6e382777 GlobalFree 4898->4899 4900 6e381312 2 API calls 4898->4900 4918 6e381381 4898->4918 4899->4840 4900->4898 4903 6e382626 4902->4903 4905 6e381931 4902->4905 4904 6e382642 GlobalFree 4903->4904 4903->4905 4904->4903 4905->4858 4905->4859 4907 6e381361 4906->4907 4908 6e3812cc 2 API calls 4907->4908 4909 6e38137f 4908->4909 4909->4869 4911 6e382808 4910->4911 4912 6e3827b2 VirtualAlloc 4910->4912 4911->4871 4912->4911 4914 6e382b4d 4913->4914 4915 6e382b5d 4914->4915 4916 6e382b52 GetLastError 4914->4916 4915->4876 4916->4915 4917->4898 4919 6e38138a 4918->4919 4920 6e3813ac 4918->4920 4919->4920 4921 6e381390 lstrcpyW 4919->4921 4920->4898 4921->4920 5134 404658 5135 404670 5134->5135 5139 40478a 5134->5139 5140 404499 18 API calls 5135->5140 5136 4047f4 5137 4048be 5136->5137 5138 4047fe GetDlgItem 5136->5138 5141 404500 8 API calls 5137->5141 5142 404818 5138->5142 5143 40487f 5138->5143 5139->5136 5139->5137 5144 4047c5 GetDlgItem SendMessageW 5139->5144 5145 4046d7 5140->5145 5146 4048b9 5141->5146 5142->5143 5147 40483e SendMessageW LoadCursorW SetCursor 5142->5147 5143->5137 5148 404891 5143->5148 5167 4044bb EnableWindow 5144->5167 5150 404499 18 API calls 5145->5150 5171 404907 5147->5171 5153 4048a7 5148->5153 5154 404897 SendMessageW 5148->5154 5151 4046e4 CheckDlgButton 5150->5151 5165 4044bb EnableWindow 5151->5165 5153->5146 5158 4048ad SendMessageW 5153->5158 5154->5153 5155 4047ef 5168 4048e3 5155->5168 5158->5146 5160 404702 GetDlgItem 5166 4044ce SendMessageW 5160->5166 5162 404718 SendMessageW 5163 404735 GetSysColor 5162->5163 5164 40473e SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5162->5164 5163->5164 5164->5146 5165->5160 5166->5162 5167->5155 5169 4048f1 5168->5169 5170 4048f6 SendMessageW 5168->5170 5169->5170 5170->5136 5174 405b63 ShellExecuteExW 5171->5174 5173 40486d LoadCursorW SetCursor 5173->5143 5174->5173 5175 402b59 5176 402b60 5175->5176 5177 402bab 5175->5177 5180 402d84 17 API calls 5176->5180 5183 402ba9 5176->5183 5178 40690a 5 API calls 5177->5178 5179 402bb2 5178->5179 5181 402da6 17 API calls 5179->5181 5182 402b6e 5180->5182 5184 402bbb 5181->5184 5185 402d84 17 API calls 5182->5185 5184->5183 5186 402bbf IIDFromString 5184->5186 5189 402b7a 5185->5189 5186->5183 5187 402bce 5186->5187 5187->5183 5193 40653d lstrcpynW 5187->5193 5192 406484 wsprintfW 5189->5192 5190 402beb CoTaskMemFree 5190->5183 5192->5183 5193->5190 5025 40175c 5026 402da6 17 API calls 5025->5026 5027 401763 5026->5027 5028 40605c 2 API calls 5027->5028 5029 40176a 5028->5029 5030 40605c 2 API calls 5029->5030 5030->5029 5194 401d5d 5195 402d84 17 API calls 5194->5195 5196 401d6e SetWindowLongW 5195->5196 5197 402c2a 5196->5197 5198 4056de 5199 405888 5198->5199 5200 4056ff GetDlgItem GetDlgItem GetDlgItem 5198->5200 5202 405891 GetDlgItem CreateThread CloseHandle 5199->5202 5203 4058b9 5199->5203 5243 4044ce SendMessageW 5200->5243 5202->5203 5205 4058e4 5203->5205 5206 4058d0 ShowWindow ShowWindow 5203->5206 5207 405909 5203->5207 5204 40576f 5209 405776 GetClientRect GetSystemMetrics SendMessageW SendMessageW 5204->5209 5208 405944 5205->5208 5211 4058f8 5205->5211 5212 40591e ShowWindow 5205->5212 5245 4044ce SendMessageW 5206->5245 5213 404500 8 API calls 5207->5213 5208->5207 5218 405952 SendMessageW 5208->5218 5216 4057e4 5209->5216 5217 4057c8 SendMessageW SendMessageW 5209->5217 5219 404472 SendMessageW 5211->5219 5214 405930 5212->5214 5215 40593e 5212->5215 5220 405917 5213->5220 5221 40559f 24 API calls 5214->5221 5222 404472 SendMessageW 5215->5222 5223 4057f7 5216->5223 5224 4057e9 SendMessageW 5216->5224 5217->5216 5218->5220 5225 40596b CreatePopupMenu 5218->5225 5219->5207 5221->5215 5222->5208 5227 404499 18 API calls 5223->5227 5224->5223 5226 40657a 17 API calls 5225->5226 5228 40597b AppendMenuW 5226->5228 5229 405807 5227->5229 5230 405998 GetWindowRect 5228->5230 5231 4059ab TrackPopupMenu 5228->5231 5232 405810 ShowWindow 5229->5232 5233 405844 GetDlgItem SendMessageW 5229->5233 5230->5231 5231->5220 5235 4059c6 5231->5235 5236 405833 5232->5236 5237 405826 ShowWindow 5232->5237 5233->5220 5234 40586b SendMessageW SendMessageW 5233->5234 5234->5220 5238 4059e2 SendMessageW 5235->5238 5244 4044ce SendMessageW 5236->5244 5237->5236 5238->5238 5239 4059ff OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5238->5239 5241 405a24 SendMessageW 5239->5241 5241->5241 5242 405a4d GlobalUnlock SetClipboardData CloseClipboard 5241->5242 5242->5220 5243->5204 5244->5233 5245->5205 5246 4028de 5247 4028e6 5246->5247 5248 4028ea FindNextFileW 5247->5248 5251 4028fc 5247->5251 5249 402943 5248->5249 5248->5251 5252 40653d lstrcpynW 5249->5252 5252->5251 5253 404ce0 5254 404cf0 5253->5254 5255 404d0c 5253->5255 5264 405b81 GetDlgItemTextW 5254->5264 5257 404d12 SHGetPathFromIDListW 5255->5257 5258 404d3f 5255->5258 5260 404d29 SendMessageW 5257->5260 5261 404d22 5257->5261 5259 404cfd SendMessageW 5259->5255 5260->5258 5262 40140b 2 API calls 5261->5262 5262->5260 5264->5259 4182 405b63 ShellExecuteExW 5265 401563 5266 402ba4 5265->5266 5269 406484 wsprintfW 5266->5269 5268 402ba9 5269->5268 5270 401968 5271 402d84 17 API calls 5270->5271 5272 40196f 5271->5272 5273 402d84 17 API calls 5272->5273 5274 40197c 5273->5274 5275 402da6 17 API calls 5274->5275 5276 401993 lstrlenW 5275->5276 5278 4019a4 5276->5278 5277 4019e5 5278->5277 5282 40653d lstrcpynW 5278->5282 5280 4019d5 5280->5277 5281 4019da lstrlenW 5280->5281 5281->5277 5282->5280 5283 40166a 5284 402da6 17 API calls 5283->5284 5285 401670 5284->5285 5286 406873 2 API calls 5285->5286 5287 401676 5286->5287 5288 402aeb 5289 402d84 17 API calls 5288->5289 5290 402af1 5289->5290 5291 40657a 17 API calls 5290->5291 5292 40292e 5290->5292 5291->5292 4350 4026ec 4351 402d84 17 API calls 4350->4351 4358 4026fb 4351->4358 4352 402745 ReadFile 4352->4358 4363 402838 4352->4363 4353 4060b0 ReadFile 4353->4358 4354 4027de 4354->4358 4354->4363 4364 40610e SetFilePointer 4354->4364 4355 402785 MultiByteToWideChar 4355->4358 4356 40283a 4373 406484 wsprintfW 4356->4373 4358->4352 4358->4353 4358->4354 4358->4355 4358->4356 4360 4027ab SetFilePointer MultiByteToWideChar 4358->4360 4361 40284b 4358->4361 4358->4363 4360->4358 4362 40286c SetFilePointer 4361->4362 4361->4363 4362->4363 4365 406142 4364->4365 4366 40612a 4364->4366 4365->4354 4367 4060b0 ReadFile 4366->4367 4368 406136 4367->4368 4368->4365 4369 406173 SetFilePointer 4368->4369 4370 40614b SetFilePointer 4368->4370 4369->4365 4370->4369 4371 406156 4370->4371 4372 4060df WriteFile 4371->4372 4372->4365 4373->4363 4719 40176f 4720 402da6 17 API calls 4719->4720 4721 401776 4720->4721 4722 401796 4721->4722 4723 40179e 4721->4723 4759 40653d lstrcpynW 4722->4759 4760 40653d lstrcpynW 4723->4760 4726 40179c 4730 4067c4 5 API calls 4726->4730 4727 4017a9 4728 405e0c 3 API calls 4727->4728 4729 4017af lstrcatW 4728->4729 4729->4726 4750 4017bb 4730->4750 4731 4017f7 4733 406008 2 API calls 4731->4733 4732 406873 2 API calls 4732->4750 4733->4750 4735 4017cd CompareFileTime 4735->4750 4736 40188d 4738 40559f 24 API calls 4736->4738 4737 401864 4739 40559f 24 API calls 4737->4739 4756 401879 4737->4756 4740 401897 4738->4740 4739->4756 4741 4032b4 31 API calls 4740->4741 4742 4018aa 4741->4742 4743 4018be SetFileTime 4742->4743 4744 4018d0 FindCloseChangeNotification 4742->4744 4743->4744 4746 4018e1 4744->4746 4744->4756 4745 40657a 17 API calls 4745->4750 4747 4018e6 4746->4747 4748 4018f9 4746->4748 4751 40657a 17 API calls 4747->4751 4752 40657a 17 API calls 4748->4752 4749 40653d lstrcpynW 4749->4750 4750->4731 4750->4732 4750->4735 4750->4736 4750->4737 4750->4745 4750->4749 4753 405b9d MessageBoxIndirectW 4750->4753 4758 40602d GetFileAttributesW CreateFileW 4750->4758 4754 4018ee lstrcatW 4751->4754 4755 401901 4752->4755 4753->4750 4754->4755 4755->4756 4757 405b9d MessageBoxIndirectW 4755->4757 4757->4756 4758->4750 4759->4726 4760->4727 5293 401a72 5294 402d84 17 API calls 5293->5294 5295 401a7b 5294->5295 5296 402d84 17 API calls 5295->5296 5297 401a20 5296->5297 5298 401573 5299 401583 ShowWindow 5298->5299 5300 40158c 5298->5300 5299->5300 5301 402c2a 5300->5301 5302 40159a ShowWindow 5300->5302 5302->5301 4784 4023f4 4785 402da6 17 API calls 4784->4785 4786 402403 4785->4786 4787 402da6 17 API calls 4786->4787 4788 40240c 4787->4788 4789 402da6 17 API calls 4788->4789 4790 402416 GetPrivateProfileStringW 4789->4790 5303 4014f5 SetForegroundWindow 5304 402c2a 5303->5304 5305 6e38170d 5306 6e3815b6 GlobalFree 5305->5306 5309 6e381725 5306->5309 5307 6e38176b GlobalFree 5308 6e381740 5308->5307 5309->5307 5309->5308 5310 6e381757 VirtualFree 5309->5310 5310->5307 5311 401ff6 5312 402da6 17 API calls 5311->5312 5313 401ffd 5312->5313 5314 406873 2 API calls 5313->5314 5315 402003 5314->5315 5317 402014 5315->5317 5318 406484 wsprintfW 5315->5318 5318->5317 5319 401b77 5320 402da6 17 API calls 5319->5320 5321 401b7e 5320->5321 5322 402d84 17 API calls 5321->5322 5323 401b87 wsprintfW 5322->5323 5324 402c2a 5323->5324 5325 6e381000 5326 6e38101b 5 API calls 5325->5326 5327 6e381019 5326->5327 5328 40167b 5329 402da6 17 API calls 5328->5329 5330 401682 5329->5330 5331 402da6 17 API calls 5330->5331 5332 40168b 5331->5332 5333 402da6 17 API calls 5332->5333 5334 401694 MoveFileW 5333->5334 5335 4016a0 5334->5335 5336 4016a7 5334->5336 5338 401423 24 API calls 5335->5338 5337 406873 2 API calls 5336->5337 5340 4022f6 5336->5340 5339 4016b6 5337->5339 5338->5340 5339->5340 5341 4062fd 36 API calls 5339->5341 5341->5335 5342 4022ff 5343 402da6 17 API calls 5342->5343 5344 402305 5343->5344 5345 402da6 17 API calls 5344->5345 5346 40230e 5345->5346 5347 402da6 17 API calls 5346->5347 5348 402317 5347->5348 5349 406873 2 API calls 5348->5349 5350 402320 5349->5350 5351 402331 lstrlenW lstrlenW 5350->5351 5352 402324 5350->5352 5353 40559f 24 API calls 5351->5353 5354 40559f 24 API calls 5352->5354 5356 40232c 5352->5356 5355 40236f SHFileOperationW 5353->5355 5354->5356 5355->5352 5355->5356 5357 4019ff 5358 402da6 17 API calls 5357->5358 5359 401a06 5358->5359 5360 402da6 17 API calls 5359->5360 5361 401a0f 5360->5361 5362 401a16 lstrcmpiW 5361->5362 5363 401a28 lstrcmpW 5361->5363 5364 401a1c 5362->5364 5363->5364 5365 401000 5366 401037 BeginPaint GetClientRect 5365->5366 5367 40100c DefWindowProcW 5365->5367 5369 4010f3 5366->5369 5370 401179 5367->5370 5371 401073 CreateBrushIndirect FillRect DeleteObject 5369->5371 5372 4010fc 5369->5372 5371->5369 5373 401102 CreateFontIndirectW 5372->5373 5374 401167 EndPaint 5372->5374 5373->5374 5375 401112 6 API calls 5373->5375 5374->5370 5375->5374 5376 6e381979 5378 6e38199c 5376->5378 5377 6e3819e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5380 6e381312 2 API calls 5377->5380 5378->5377 5379 6e3819d1 GlobalFree 5378->5379 5379->5377 5381 6e381b6e GlobalFree GlobalFree 5380->5381 5382 401d81 5383 401d94 GetDlgItem 5382->5383 5384 401d87 5382->5384 5385 401d8e 5383->5385 5386 402d84 17 API calls 5384->5386 5387 401dd5 GetClientRect LoadImageW SendMessageW 5385->5387 5388 402da6 17 API calls 5385->5388 5386->5385 5390 401e33 5387->5390 5392 401e3f 5387->5392 5388->5387 5391 401e38 DeleteObject 5390->5391 5390->5392 5391->5392 5393 401503 5394 40150b 5393->5394 5396 40151e 5393->5396 5395 402d84 17 API calls 5394->5395 5395->5396 5397 402383 5398 40239d 5397->5398 5399 40238a 5397->5399 5400 40657a 17 API calls 5399->5400 5401 402397 5400->5401 5401->5398 5402 405b9d MessageBoxIndirectW 5401->5402 5402->5398 5403 402c05 SendMessageW 5404 402c2a 5403->5404 5405 402c1f InvalidateRect 5403->5405 5405->5404 4187 404f06 GetDlgItem GetDlgItem 4188 404f58 7 API calls 4187->4188 4198 40517d 4187->4198 4189 404ff2 SendMessageW 4188->4189 4190 404fff DeleteObject 4188->4190 4189->4190 4191 405008 4190->4191 4192 40503f 4191->4192 4194 405017 4191->4194 4244 404499 4192->4244 4193 40525f 4196 40530b 4193->4196 4201 4054fe 4193->4201 4208 4052b8 SendMessageW 4193->4208 4199 40657a 17 API calls 4194->4199 4202 405315 SendMessageW 4196->4202 4203 40531d 4196->4203 4197 405240 4197->4193 4209 405251 SendMessageW 4197->4209 4198->4193 4198->4197 4204 4051db 4198->4204 4205 405021 SendMessageW SendMessageW 4199->4205 4200 405053 4207 404499 18 API calls 4200->4207 4266 404500 4201->4266 4202->4203 4212 405336 4203->4212 4213 40532f ImageList_Destroy 4203->4213 4221 405346 4203->4221 4249 404e54 SendMessageW 4204->4249 4205->4191 4225 405064 4207->4225 4208->4201 4215 4052cd SendMessageW 4208->4215 4209->4193 4216 40533f GlobalFree 4212->4216 4212->4221 4213->4212 4214 4054c0 4214->4201 4222 4054d2 ShowWindow GetDlgItem ShowWindow 4214->4222 4218 4052e0 4215->4218 4216->4221 4217 40513f GetWindowLongW SetWindowLongW 4219 405158 4217->4219 4229 4052f1 SendMessageW 4218->4229 4223 405175 4219->4223 4224 40515d ShowWindow 4219->4224 4220 4051ec 4220->4197 4221->4214 4236 405381 4221->4236 4254 404ed4 4221->4254 4222->4201 4248 4044ce SendMessageW 4223->4248 4247 4044ce SendMessageW 4224->4247 4225->4217 4228 4050b7 SendMessageW 4225->4228 4230 40513a 4225->4230 4232 4050f5 SendMessageW 4225->4232 4233 405109 SendMessageW 4225->4233 4228->4225 4229->4196 4230->4217 4230->4219 4231 405170 4231->4201 4232->4225 4233->4225 4235 40548b 4237 405496 InvalidateRect 4235->4237 4241 4054a2 4235->4241 4238 4053af SendMessageW 4236->4238 4239 4053c5 4236->4239 4237->4241 4238->4239 4239->4235 4240 405426 4239->4240 4242 405439 SendMessageW SendMessageW 4239->4242 4240->4242 4241->4214 4263 404e0f 4241->4263 4242->4239 4245 40657a 17 API calls 4244->4245 4246 4044a4 SetDlgItemTextW 4245->4246 4246->4200 4247->4231 4248->4198 4250 404eb3 SendMessageW 4249->4250 4251 404e77 GetMessagePos ScreenToClient SendMessageW 4249->4251 4253 404eab 4250->4253 4252 404eb0 4251->4252 4251->4253 4252->4250 4253->4220 4280 40653d lstrcpynW 4254->4280 4256 404ee7 4281 406484 wsprintfW 4256->4281 4258 404ef1 4282 40140b 4258->4282 4262 404f01 4262->4236 4290 404d46 4263->4290 4265 404e24 4265->4214 4267 4045c3 4266->4267 4268 404518 GetWindowLongW 4266->4268 4268->4267 4269 40452d 4268->4269 4269->4267 4270 40455a GetSysColor 4269->4270 4271 40455d 4269->4271 4270->4271 4272 404563 SetTextColor 4271->4272 4273 40456d SetBkMode 4271->4273 4272->4273 4274 404585 GetSysColor 4273->4274 4275 40458b 4273->4275 4274->4275 4276 404592 SetBkColor 4275->4276 4277 40459c 4275->4277 4276->4277 4277->4267 4278 4045b6 CreateBrushIndirect 4277->4278 4279 4045af DeleteObject 4277->4279 4278->4267 4279->4278 4280->4256 4281->4258 4286 401389 4282->4286 4285 40653d lstrcpynW 4285->4262 4288 401390 4286->4288 4287 4013fe 4287->4285 4288->4287 4289 4013cb MulDiv SendMessageW 4288->4289 4289->4288 4291 404d5f 4290->4291 4292 40657a 17 API calls 4291->4292 4293 404dc3 4292->4293 4294 40657a 17 API calls 4293->4294 4295 404dce 4294->4295 4296 40657a 17 API calls 4295->4296 4297 404de4 lstrlenW wsprintfW SetDlgItemTextW 4296->4297 4297->4265 4298 6e382a7f 4299 6e382acf 4298->4299 4300 6e382a8f VirtualProtect 4298->4300 4300->4299 5406 404609 lstrlenW 5407 404628 5406->5407 5408 40462a WideCharToMultiByte 5406->5408 5407->5408 4301 40248a 4302 402da6 17 API calls 4301->4302 4303 40249c 4302->4303 4304 402da6 17 API calls 4303->4304 4305 4024a6 4304->4305 4318 402e36 4305->4318 4307 402c2a 4309 4024de 4311 4024ea 4309->4311 4313 402d84 17 API calls 4309->4313 4310 402da6 17 API calls 4312 4024d4 lstrlenW 4310->4312 4314 402509 RegSetValueExW 4311->4314 4322 4032b4 4311->4322 4312->4309 4313->4311 4315 40251f RegCloseKey 4314->4315 4315->4307 4319 402e51 4318->4319 4342 4063d8 4319->4342 4323 4032cd 4322->4323 4324 4032fb 4323->4324 4349 4034e5 SetFilePointer 4323->4349 4346 4034cf 4324->4346 4328 403468 4330 4034aa 4328->4330 4334 40346c 4328->4334 4329 403318 GetTickCount 4333 403452 4329->4333 4341 403367 4329->4341 4331 4034cf ReadFile 4330->4331 4331->4333 4332 4034cf ReadFile 4332->4341 4333->4314 4334->4333 4335 4034cf ReadFile 4334->4335 4336 4060df WriteFile 4334->4336 4335->4334 4336->4334 4337 4033bd GetTickCount 4337->4341 4338 4033e2 MulDiv wsprintfW 4339 40559f 24 API calls 4338->4339 4339->4341 4340 4060df WriteFile 4340->4341 4341->4332 4341->4333 4341->4337 4341->4338 4341->4340 4343 4063e7 4342->4343 4344 4063f2 RegCreateKeyExW 4343->4344 4345 4024b6 4343->4345 4344->4345 4345->4307 4345->4309 4345->4310 4347 4060b0 ReadFile 4346->4347 4348 403306 4347->4348 4348->4328 4348->4329 4348->4333 4349->4324 5409 40498a 5410 4049b6 5409->5410 5411 4049c7 5409->5411 5470 405b81 GetDlgItemTextW 5410->5470 5412 4049d3 GetDlgItem 5411->5412 5419 404a32 5411->5419 5415 4049e7 5412->5415 5414 4049c1 5417 4067c4 5 API calls 5414->5417 5418 4049fb SetWindowTextW 5415->5418 5422 405eb7 4 API calls 5415->5422 5416 404b16 5468 404cc5 5416->5468 5472 405b81 GetDlgItemTextW 5416->5472 5417->5411 5423 404499 18 API calls 5418->5423 5419->5416 5424 40657a 17 API calls 5419->5424 5419->5468 5421 404500 8 API calls 5426 404cd9 5421->5426 5427 4049f1 5422->5427 5428 404a17 5423->5428 5429 404aa6 SHBrowseForFolderW 5424->5429 5425 404b46 5430 405f14 18 API calls 5425->5430 5427->5418 5434 405e0c 3 API calls 5427->5434 5431 404499 18 API calls 5428->5431 5429->5416 5432 404abe CoTaskMemFree 5429->5432 5433 404b4c 5430->5433 5435 404a25 5431->5435 5436 405e0c 3 API calls 5432->5436 5473 40653d lstrcpynW 5433->5473 5434->5418 5471 4044ce SendMessageW 5435->5471 5438 404acb 5436->5438 5441 404b02 SetDlgItemTextW 5438->5441 5445 40657a 17 API calls 5438->5445 5440 404a2b 5443 40690a 5 API calls 5440->5443 5441->5416 5442 404b63 5444 40690a 5 API calls 5442->5444 5443->5419 5452 404b6a 5444->5452 5446 404aea lstrcmpiW 5445->5446 5446->5441 5448 404afb lstrcatW 5446->5448 5447 404bab 5474 40653d lstrcpynW 5447->5474 5448->5441 5450 404bb2 5451 405eb7 4 API calls 5450->5451 5453 404bb8 GetDiskFreeSpaceW 5451->5453 5452->5447 5456 405e58 2 API calls 5452->5456 5457 404c03 5452->5457 5455 404bdc MulDiv 5453->5455 5453->5457 5455->5457 5456->5452 5458 404e0f 20 API calls 5457->5458 5459 404c74 5457->5459 5461 404c61 5458->5461 5460 404c97 5459->5460 5462 40140b 2 API calls 5459->5462 5475 4044bb EnableWindow 5460->5475 5463 404c76 SetDlgItemTextW 5461->5463 5464 404c66 5461->5464 5462->5460 5463->5459 5466 404d46 20 API calls 5464->5466 5466->5459 5467 404cb3 5467->5468 5469 4048e3 SendMessageW 5467->5469 5468->5421 5469->5468 5470->5414 5471->5440 5472->5425 5473->5442 5474->5450 5475->5467 5476 40290b 5477 402da6 17 API calls 5476->5477 5478 402912 FindFirstFileW 5477->5478 5479 40293a 5478->5479 5483 402925 5478->5483 5480 402943 5479->5480 5484 406484 wsprintfW 5479->5484 5485 40653d lstrcpynW 5480->5485 5484->5480 5485->5483 4374 6e381774 4375 6e3817a3 4374->4375 4398 6e381bff 4375->4398 4377 6e3817aa 4378 6e3817bd 4377->4378 4379 6e3817b1 4377->4379 4381 6e3817e4 4378->4381 4382 6e3817c7 4378->4382 4380 6e381312 2 API calls 4379->4380 4383 6e3817bb 4380->4383 4385 6e3817ea 4381->4385 4386 6e38180e 4381->4386 4432 6e3815dd wsprintfW 4382->4432 4387 6e381654 3 API calls 4385->4387 4388 6e3815dd 3 API calls 4386->4388 4390 6e3817ef 4387->4390 4388->4383 4392 6e381312 2 API calls 4390->4392 4394 6e3817f5 GlobalFree 4392->4394 4394->4383 4396 6e381809 GlobalFree 4394->4396 4396->4383 4443 6e3812bb GlobalAlloc 4398->4443 4400 6e381c26 4444 6e3812bb GlobalAlloc 4400->4444 4402 6e381e6b GlobalFree GlobalFree GlobalFree 4403 6e381e88 4402->4403 4421 6e381ed2 4402->4421 4404 6e38227e 4403->4404 4412 6e381e9d 4403->4412 4403->4421 4406 6e3822a0 GetModuleHandleW 4404->4406 4404->4421 4405 6e381d26 GlobalAlloc 4425 6e381c31 4405->4425 4409 6e3822b1 LoadLibraryW 4406->4409 4410 6e3822c6 4406->4410 4407 6e381d71 lstrcpyW 4411 6e381d7b lstrcpyW 4407->4411 4408 6e381d8f GlobalFree 4408->4425 4409->4410 4409->4421 4451 6e3816bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4410->4451 4411->4425 4412->4421 4447 6e3812cc 4412->4447 4414 6e382318 4417 6e382325 lstrlenW 4414->4417 4414->4421 4415 6e382126 4450 6e3812bb GlobalAlloc 4415->4450 4452 6e3816bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4417->4452 4419 6e382067 GlobalFree 4419->4425 4420 6e3821ae 4420->4421 4428 6e382216 lstrcpyW 4420->4428 4421->4377 4422 6e3822d8 4422->4414 4430 6e382302 GetProcAddress 4422->4430 4424 6e38233f 4424->4421 4425->4402 4425->4405 4425->4407 4425->4408 4425->4411 4425->4415 4425->4419 4425->4420 4425->4421 4426 6e3812cc 2 API calls 4425->4426 4427 6e381dcd 4425->4427 4426->4425 4427->4425 4445 6e38162f GlobalSize GlobalAlloc 4427->4445 4428->4421 4430->4414 4431 6e38212f 4431->4377 4433 6e381312 2 API calls 4432->4433 4434 6e3815fe 4433->4434 4435 6e381654 4434->4435 4454 6e3812bb GlobalAlloc 4435->4454 4437 6e381659 4455 6e381666 4437->4455 4440 6e381312 4441 6e38131b GlobalAlloc lstrcpynW 4440->4441 4442 6e381355 CloseHandle 4440->4442 4441->4442 4442->4383 4443->4400 4444->4425 4446 6e38164d 4445->4446 4446->4427 4453 6e3812bb GlobalAlloc 4447->4453 4449 6e3812db lstrcpynW 4449->4421 4450->4431 4451->4422 4452->4424 4453->4449 4454->4437 4456 6e38169f lstrcpyW 4455->4456 4457 6e381672 wsprintfW 4455->4457 4460 6e381663 4456->4460 4457->4460 4460->4440 5486 40190c 5487 401943 5486->5487 5488 402da6 17 API calls 5487->5488 5489 401948 5488->5489 5490 405c49 67 API calls 5489->5490 5491 401951 5490->5491 5492 40190f 5493 402da6 17 API calls 5492->5493 5494 401916 5493->5494 5495 405b9d MessageBoxIndirectW 5494->5495 5496 40191f 5495->5496 4761 402891 4762 402898 4761->4762 4763 402ba9 4761->4763 4764 402d84 17 API calls 4762->4764 4765 40289f 4764->4765 4766 4028ae SetFilePointer 4765->4766 4766->4763 4767 4028be 4766->4767 4769 406484 wsprintfW 4767->4769 4769->4763 5497 401491 5498 40559f 24 API calls 5497->5498 5499 401498 5498->5499 5500 6e3823e9 5501 6e382453 5500->5501 5502 6e38245e GlobalAlloc 5501->5502 5503 6e38247d 5501->5503 5502->5501 5504 401f12 5505 402da6 17 API calls 5504->5505 5506 401f18 5505->5506 5507 402da6 17 API calls 5506->5507 5508 401f21 5507->5508 5509 402da6 17 API calls 5508->5509 5510 401f2a 5509->5510 5511 402da6 17 API calls 5510->5511 5512 401f33 5511->5512 5513 401423 24 API calls 5512->5513 5514 401f3a 5513->5514 5521 405b63 ShellExecuteExW 5514->5521 5516 401f82 5519 40292e 5516->5519 5522 4069b5 WaitForSingleObject 5516->5522 5518 401f9f CloseHandle 5518->5519 5521->5516 5524 4069cf 5522->5524 5523 4069e1 GetExitCodeProcess 5523->5518 5524->5523 5525 406946 2 API calls 5524->5525 5526 4069d6 WaitForSingleObject 5525->5526 5526->5524 4770 405513 4771 405523 4770->4771 4772 405537 4770->4772 4773 405529 4771->4773 4783 405580 4771->4783 4774 40553f IsWindowVisible 4772->4774 4776 40555f 4772->4776 4778 4044e5 SendMessageW 4773->4778 4775 40554c 4774->4775 4774->4783 4779 404e54 5 API calls 4775->4779 4777 405585 CallWindowProcW 4776->4777 4782 404ed4 4 API calls 4776->4782 4780 405533 4777->4780 4778->4780 4781 405556 4779->4781 4781->4776 4782->4783 4783->4777 5527 402f93 5528 402fa5 SetTimer 5527->5528 5529 402fbe 5527->5529 5528->5529 5530 403013 5529->5530 5531 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5529->5531 5531->5530 5532 401d17 5533 402d84 17 API calls 5532->5533 5534 401d1d IsWindow 5533->5534 5535 401a20 5534->5535 5536 6e3810e1 5546 6e381111 5536->5546 5537 6e3812b0 GlobalFree 5538 6e381240 GlobalFree 5538->5546 5539 6e3811d7 GlobalAlloc 5539->5546 5540 6e38135a 2 API calls 5540->5546 5541 6e3812ab 5541->5537 5542 6e381312 2 API calls 5542->5546 5543 6e38129a GlobalFree 5543->5546 5544 6e381381 lstrcpyW 5544->5546 5545 6e38116b GlobalAlloc 5545->5546 5546->5537 5546->5538 5546->5539 5546->5540 5546->5541 5546->5542 5546->5543 5546->5544 5546->5545 4922 403f9a 4923 403fb2 4922->4923 4924 404113 4922->4924 4923->4924 4925 403fbe 4923->4925 4926 404164 4924->4926 4927 404124 GetDlgItem GetDlgItem 4924->4927 4928 403fc9 SetWindowPos 4925->4928 4929 403fdc 4925->4929 4931 4041be 4926->4931 4936 401389 2 API calls 4926->4936 4930 404499 18 API calls 4927->4930 4928->4929 4933 403fe5 ShowWindow 4929->4933 4934 404027 4929->4934 4935 40414e SetClassLongW 4930->4935 4932 4044e5 SendMessageW 4931->4932 4949 40410e 4931->4949 4965 4041d0 4932->4965 4937 404100 4933->4937 4938 404005 GetWindowLongW 4933->4938 4939 404046 4934->4939 4940 40402f DestroyWindow 4934->4940 4941 40140b 2 API calls 4935->4941 4942 404196 4936->4942 4943 404500 8 API calls 4937->4943 4938->4937 4944 40401e ShowWindow 4938->4944 4946 40404b SetWindowLongW 4939->4946 4947 40405c 4939->4947 4945 404443 4940->4945 4941->4926 4942->4931 4948 40419a SendMessageW 4942->4948 4943->4949 4944->4934 4945->4949 4955 404453 ShowWindow 4945->4955 4946->4949 4947->4937 4952 404068 GetDlgItem 4947->4952 4948->4949 4950 40140b 2 API calls 4950->4965 4951 404424 DestroyWindow EndDialog 4951->4945 4953 404096 4952->4953 4954 404079 SendMessageW IsWindowEnabled 4952->4954 4957 4040a3 4953->4957 4958 4040ea SendMessageW 4953->4958 4959 4040b6 4953->4959 4969 40409b 4953->4969 4954->4949 4954->4953 4955->4949 4956 40657a 17 API calls 4956->4965 4957->4958 4957->4969 4958->4937 4962 4040d3 4959->4962 4963 4040be 4959->4963 4961 404499 18 API calls 4961->4965 4966 40140b 2 API calls 4962->4966 4967 40140b 2 API calls 4963->4967 4964 4040d1 4964->4937 4965->4949 4965->4950 4965->4951 4965->4956 4965->4961 4970 404499 18 API calls 4965->4970 4986 404364 DestroyWindow 4965->4986 4968 4040da 4966->4968 4967->4969 4968->4937 4968->4969 4999 404472 4969->4999 4971 40424b GetDlgItem 4970->4971 4972 404260 4971->4972 4973 404268 ShowWindow KiUserCallbackDispatcher 4971->4973 4972->4973 4996 4044bb EnableWindow 4973->4996 4975 404292 EnableWindow 4979 4042a6 4975->4979 4976 4042ab GetSystemMenu EnableMenuItem SendMessageW 4977 4042db SendMessageW 4976->4977 4976->4979 4977->4979 4979->4976 4980 403f7b 18 API calls 4979->4980 4997 4044ce SendMessageW 4979->4997 4998 40653d lstrcpynW 4979->4998 4980->4979 4982 40430a lstrlenW 4983 40657a 17 API calls 4982->4983 4984 404320 SetWindowTextW 4983->4984 4985 401389 2 API calls 4984->4985 4985->4965 4986->4945 4987 40437e CreateDialogParamW 4986->4987 4987->4945 4988 4043b1 4987->4988 4989 404499 18 API calls 4988->4989 4990 4043bc GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4989->4990 4991 401389 2 API calls 4990->4991 4992 404402 4991->4992 4992->4949 4993 40440a ShowWindow 4992->4993 4994 4044e5 SendMessageW 4993->4994 4995 404422 4994->4995 4995->4945 4996->4975 4997->4979 4998->4982 5000 404479 4999->5000 5001 40447f SendMessageW 4999->5001 5000->5001 5001->4964 5002 401b9b 5003 401bec 5002->5003 5005 401ba8 5002->5005 5004 401c16 GlobalAlloc 5003->5004 5008 401bf1 5003->5008 5009 40657a 17 API calls 5004->5009 5006 401c31 5005->5006 5010 401bbf 5005->5010 5007 40657a 17 API calls 5006->5007 5016 40239d 5006->5016 5011 402397 5007->5011 5008->5016 5023 40653d lstrcpynW 5008->5023 5009->5006 5021 40653d lstrcpynW 5010->5021 5011->5016 5017 405b9d MessageBoxIndirectW 5011->5017 5014 401c03 GlobalFree 5014->5016 5015 401bce 5022 40653d lstrcpynW 5015->5022 5017->5016 5019 401bdd 5024 40653d lstrcpynW 5019->5024 5021->5015 5022->5019 5023->5014 5024->5016 5547 40261c 5548 402da6 17 API calls 5547->5548 5549 402623 5548->5549 5552 40602d GetFileAttributesW CreateFileW 5549->5552 5551 40262f 5552->5551 5031 40259e 5042 402de6 5031->5042 5034 402d84 17 API calls 5035 4025b1 5034->5035 5036 4025d9 RegEnumValueW 5035->5036 5037 4025cd RegEnumKeyW 5035->5037 5040 40292e 5035->5040 5038 4025f5 RegCloseKey 5036->5038 5039 4025ee 5036->5039 5037->5038 5038->5040 5039->5038 5043 402da6 17 API calls 5042->5043 5044 402dfd 5043->5044 5045 4063aa RegOpenKeyExW 5044->5045 5046 4025a8 5045->5046 5046->5034 5553 40149e 5554 4014ac PostQuitMessage 5553->5554 5555 40239d 5553->5555 5554->5555 5556 6e381058 5558 6e381074 5556->5558 5557 6e3810dd 5558->5557 5559 6e3815b6 GlobalFree 5558->5559 5560 6e381092 5558->5560 5559->5560 5561 6e3815b6 GlobalFree 5560->5561 5562 6e3810a2 5561->5562 5563 6e3810a9 GlobalSize 5562->5563 5564 6e3810b2 5562->5564 5563->5564 5565 6e3810c7 5564->5565 5566 6e3810b6 GlobalAlloc 5564->5566 5568 6e3810d2 GlobalFree 5565->5568 5567 6e3815dd 3 API calls 5566->5567 5567->5565 5568->5557 4183 4015a3 4184 402da6 17 API calls 4183->4184 4185 4015aa SetFileAttributesW 4184->4185 4186 4015bc 4185->4186 5569 401fa4 5570 402da6 17 API calls 5569->5570 5571 401faa 5570->5571 5572 40559f 24 API calls 5571->5572 5573 401fb4 5572->5573 5574 405b20 2 API calls 5573->5574 5575 401fba 5574->5575 5576 401fdd CloseHandle 5575->5576 5578 4069b5 5 API calls 5575->5578 5580 40292e 5575->5580 5576->5580 5579 401fcf 5578->5579 5579->5576 5582 406484 wsprintfW 5579->5582 5582->5576 5583 40202a 5584 402da6 17 API calls 5583->5584 5585 402031 5584->5585 5586 40690a 5 API calls 5585->5586 5587 402040 5586->5587 5588 4020cc 5587->5588 5589 40205c GlobalAlloc 5587->5589 5589->5588 5590 402070 5589->5590 5591 40690a 5 API calls 5590->5591 5592 402077 5591->5592 5593 40690a 5 API calls 5592->5593 5594 402081 5593->5594 5594->5588 5598 406484 wsprintfW 5594->5598 5596 4020ba 5599 406484 wsprintfW 5596->5599 5598->5596 5599->5588 5600 40252a 5601 402de6 17 API calls 5600->5601 5602 402534 5601->5602 5603 402da6 17 API calls 5602->5603 5604 40253d 5603->5604 5605 402548 RegQueryValueExW 5604->5605 5610 40292e 5604->5610 5606 40256e RegCloseKey 5605->5606 5607 402568 5605->5607 5606->5610 5607->5606 5611 406484 wsprintfW 5607->5611 5611->5606 5612 4021aa 5613 402da6 17 API calls 5612->5613 5614 4021b1 5613->5614 5615 402da6 17 API calls 5614->5615 5616 4021bb 5615->5616 5617 402da6 17 API calls 5616->5617 5618 4021c5 5617->5618 5619 402da6 17 API calls 5618->5619 5620 4021cf 5619->5620 5621 402da6 17 API calls 5620->5621 5622 4021d9 5621->5622 5623 402218 CoCreateInstance 5622->5623 5624 402da6 17 API calls 5622->5624 5627 402237 5623->5627 5624->5623 5625 401423 24 API calls 5626 4022f6 5625->5626 5627->5625 5627->5626 5628 403baa 5629 403bb5 5628->5629 5630 403bb9 5629->5630 5631 403bbc GlobalAlloc 5629->5631 5631->5630 4461 40352d SetErrorMode GetVersionExW 4462 4035b7 4461->4462 4463 40357f GetVersionExW 4461->4463 4464 403610 4462->4464 4465 40690a 5 API calls 4462->4465 4463->4462 4466 40689a 3 API calls 4464->4466 4465->4464 4467 403626 lstrlenA 4466->4467 4467->4464 4468 403636 4467->4468 4469 40690a 5 API calls 4468->4469 4470 40363d 4469->4470 4471 40690a 5 API calls 4470->4471 4472 403644 4471->4472 4473 40690a 5 API calls 4472->4473 4474 403650 #17 OleInitialize SHGetFileInfoW 4473->4474 4552 40653d lstrcpynW 4474->4552 4477 40369d GetCommandLineW 4553 40653d lstrcpynW 4477->4553 4479 4036af 4480 405e39 CharNextW 4479->4480 4481 4036d5 CharNextW 4480->4481 4492 4036e6 4481->4492 4482 4037e4 4483 4037f8 GetTempPathW 4482->4483 4554 4034fc 4483->4554 4485 403810 4486 403814 GetWindowsDirectoryW lstrcatW 4485->4486 4487 40386a DeleteFileW 4485->4487 4489 4034fc 12 API calls 4486->4489 4564 40307d GetTickCount GetModuleFileNameW 4487->4564 4488 405e39 CharNextW 4488->4492 4493 403830 4489->4493 4491 40387d 4494 403941 4491->4494 4497 403932 4491->4497 4501 405e39 CharNextW 4491->4501 4492->4482 4492->4488 4496 4037e6 4492->4496 4493->4487 4495 403834 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4493->4495 4656 403b12 4494->4656 4500 4034fc 12 API calls 4495->4500 4648 40653d lstrcpynW 4496->4648 4592 403bec 4497->4592 4504 403862 4500->4504 4517 40389f 4501->4517 4504->4487 4504->4494 4505 403a69 4663 405b9d 4505->4663 4506 403a7e 4508 403a86 GetCurrentProcess OpenProcessToken 4506->4508 4509 403afc ExitProcess 4506->4509 4514 403acc 4508->4514 4515 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 4508->4515 4511 403908 4519 405f14 18 API calls 4511->4519 4512 403949 4518 405b08 5 API calls 4512->4518 4516 40690a 5 API calls 4514->4516 4515->4514 4520 403ad3 4516->4520 4517->4511 4517->4512 4521 40394e lstrcatW 4518->4521 4522 403914 4519->4522 4523 403ae8 ExitWindowsEx 4520->4523 4526 403af5 4520->4526 4524 40396a lstrcatW lstrcmpiW 4521->4524 4525 40395f lstrcatW 4521->4525 4522->4494 4649 40653d lstrcpynW 4522->4649 4523->4509 4523->4526 4524->4494 4527 40398a 4524->4527 4525->4524 4530 40140b 2 API calls 4526->4530 4531 403996 4527->4531 4532 40398f 4527->4532 4529 403927 4650 40653d lstrcpynW 4529->4650 4530->4509 4533 405aeb 2 API calls 4531->4533 4535 405a6e 4 API calls 4532->4535 4536 40399b SetCurrentDirectoryW 4533->4536 4537 403994 4535->4537 4538 4039b8 4536->4538 4539 4039ad 4536->4539 4537->4536 4652 40653d lstrcpynW 4538->4652 4651 40653d lstrcpynW 4539->4651 4542 40657a 17 API calls 4543 4039fa DeleteFileW 4542->4543 4544 403a06 CopyFileW 4543->4544 4549 4039c5 4543->4549 4544->4549 4545 403a50 4546 4062fd 36 API calls 4545->4546 4546->4494 4547 4062fd 36 API calls 4547->4549 4548 40657a 17 API calls 4548->4549 4549->4542 4549->4545 4549->4547 4549->4548 4551 403a3a CloseHandle 4549->4551 4653 405b20 CreateProcessW 4549->4653 4551->4549 4552->4477 4553->4479 4555 4067c4 5 API calls 4554->4555 4557 403508 4555->4557 4556 403512 4556->4485 4557->4556 4558 405e0c 3 API calls 4557->4558 4559 40351a 4558->4559 4560 405aeb 2 API calls 4559->4560 4561 403520 4560->4561 4667 40605c 4561->4667 4671 40602d GetFileAttributesW CreateFileW 4564->4671 4566 4030bd 4586 4030cd 4566->4586 4672 40653d lstrcpynW 4566->4672 4568 4030e3 4569 405e58 2 API calls 4568->4569 4570 4030e9 4569->4570 4673 40653d lstrcpynW 4570->4673 4572 4030f4 GetFileSize 4573 4031ee 4572->4573 4591 40310b 4572->4591 4674 403019 4573->4674 4575 4031f7 4577 403227 GlobalAlloc 4575->4577 4575->4586 4686 4034e5 SetFilePointer 4575->4686 4576 4034cf ReadFile 4576->4591 4685 4034e5 SetFilePointer 4577->4685 4578 40325a 4583 403019 6 API calls 4578->4583 4581 403210 4584 4034cf ReadFile 4581->4584 4582 403242 4585 4032b4 31 API calls 4582->4585 4583->4586 4587 40321b 4584->4587 4589 40324e 4585->4589 4586->4491 4587->4577 4587->4586 4588 403019 6 API calls 4588->4591 4589->4586 4589->4589 4590 40328b SetFilePointer 4589->4590 4590->4586 4591->4573 4591->4576 4591->4578 4591->4586 4591->4588 4593 40690a 5 API calls 4592->4593 4594 403c00 4593->4594 4595 403c06 4594->4595 4596 403c18 4594->4596 4699 406484 wsprintfW 4595->4699 4597 40640b 3 API calls 4596->4597 4598 403c48 4597->4598 4600 403c67 lstrcatW 4598->4600 4601 40640b 3 API calls 4598->4601 4602 403c16 4600->4602 4601->4600 4691 403ec2 4602->4691 4605 405f14 18 API calls 4606 403c99 4605->4606 4607 403d2d 4606->4607 4609 40640b 3 API calls 4606->4609 4608 405f14 18 API calls 4607->4608 4610 403d33 4608->4610 4611 403ccb 4609->4611 4612 403d43 LoadImageW 4610->4612 4613 40657a 17 API calls 4610->4613 4611->4607 4619 403cec lstrlenW 4611->4619 4622 405e39 CharNextW 4611->4622 4614 403de9 4612->4614 4615 403d6a RegisterClassW 4612->4615 4613->4612 4618 40140b 2 API calls 4614->4618 4616 403da0 SystemParametersInfoW CreateWindowExW 4615->4616 4617 403df3 4615->4617 4616->4614 4617->4494 4624 403def 4618->4624 4620 403d20 4619->4620 4621 403cfa lstrcmpiW 4619->4621 4625 405e0c 3 API calls 4620->4625 4621->4620 4623 403d0a GetFileAttributesW 4621->4623 4626 403ce9 4622->4626 4627 403d16 4623->4627 4624->4617 4628 403ec2 18 API calls 4624->4628 4629 403d26 4625->4629 4626->4619 4627->4620 4630 405e58 2 API calls 4627->4630 4631 403e00 4628->4631 4700 40653d lstrcpynW 4629->4700 4630->4620 4633 403e0c ShowWindow 4631->4633 4634 403e8f 4631->4634 4636 40689a 3 API calls 4633->4636 4701 405672 OleInitialize 4634->4701 4638 403e24 4636->4638 4637 403e95 4639 403eb1 4637->4639 4640 403e99 4637->4640 4641 403e32 GetClassInfoW 4638->4641 4643 40689a 3 API calls 4638->4643 4642 40140b 2 API calls 4639->4642 4640->4617 4647 40140b 2 API calls 4640->4647 4644 403e46 GetClassInfoW RegisterClassW 4641->4644 4645 403e5c DialogBoxParamW 4641->4645 4642->4617 4643->4641 4644->4645 4646 40140b 2 API calls 4645->4646 4646->4617 4647->4617 4648->4483 4649->4529 4650->4497 4651->4538 4652->4549 4654 405b53 CloseHandle 4653->4654 4655 405b5f 4653->4655 4654->4655 4655->4549 4657 403b2a 4656->4657 4658 403b1c CloseHandle 4656->4658 4715 403b57 4657->4715 4658->4657 4661 405c49 67 API calls 4662 403a5e OleUninitialize 4661->4662 4662->4505 4662->4506 4664 405bb2 4663->4664 4665 403a76 ExitProcess 4664->4665 4666 405bc6 MessageBoxIndirectW 4664->4666 4666->4665 4668 406069 GetTickCount GetTempFileNameW 4667->4668 4669 40352b 4668->4669 4670 40609f 4668->4670 4669->4485 4670->4668 4670->4669 4671->4566 4672->4568 4673->4572 4675 403022 4674->4675 4676 40303a 4674->4676 4677 403032 4675->4677 4678 40302b DestroyWindow 4675->4678 4679 403042 4676->4679 4680 40304a GetTickCount 4676->4680 4677->4575 4678->4677 4687 406946 4679->4687 4682 403058 CreateDialogParamW ShowWindow 4680->4682 4683 40307b 4680->4683 4682->4683 4683->4575 4685->4582 4686->4581 4688 406963 PeekMessageW 4687->4688 4689 403048 4688->4689 4690 406959 DispatchMessageW 4688->4690 4689->4575 4690->4688 4692 403ed6 4691->4692 4708 406484 wsprintfW 4692->4708 4694 403f47 4709 403f7b 4694->4709 4696 403c77 4696->4605 4697 403f4c 4697->4696 4698 40657a 17 API calls 4697->4698 4698->4697 4699->4602 4700->4607 4712 4044e5 4701->4712 4703 405695 4706 401389 2 API calls 4703->4706 4707 4056bc 4703->4707 4704 4044e5 SendMessageW 4705 4056ce OleUninitialize 4704->4705 4705->4637 4706->4703 4707->4704 4708->4694 4710 40657a 17 API calls 4709->4710 4711 403f89 SetWindowTextW 4710->4711 4711->4697 4713 4044fd 4712->4713 4714 4044ee SendMessageW 4712->4714 4713->4703 4714->4713 4716 403b65 4715->4716 4717 403b2f 4716->4717 4718 403b6a FreeLibrary GlobalFree 4716->4718 4717->4661 4718->4717 4718->4718 5632 401a30 5633 402da6 17 API calls 5632->5633 5634 401a39 ExpandEnvironmentStringsW 5633->5634 5635 401a4d 5634->5635 5637 401a60 5634->5637 5636 401a52 lstrcmpW 5635->5636 5635->5637 5636->5637 5643 4023b2 5644 4023ba 5643->5644 5646 4023c0 5643->5646 5647 402da6 17 API calls 5644->5647 5645 4023ce 5649 4023dc 5645->5649 5650 402da6 17 API calls 5645->5650 5646->5645 5648 402da6 17 API calls 5646->5648 5647->5646 5648->5645 5651 402da6 17 API calls 5649->5651 5650->5649 5652 4023e5 WritePrivateProfileStringW 5651->5652 5653 402434 5654 402467 5653->5654 5655 40243c 5653->5655 5656 402da6 17 API calls 5654->5656 5657 402de6 17 API calls 5655->5657 5658 40246e 5656->5658 5659 402443 5657->5659 5664 402e64 5658->5664 5661 40247b 5659->5661 5662 402da6 17 API calls 5659->5662 5663 402454 RegDeleteValueW RegCloseKey 5662->5663 5663->5661 5665 402e78 5664->5665 5666 402e71 5664->5666 5665->5666 5668 402ea9 5665->5668 5666->5661 5669 4063aa RegOpenKeyExW 5668->5669 5670 402ed7 5669->5670 5671 402ee7 RegEnumValueW 5670->5671 5678 402f81 5670->5678 5680 402f0a 5670->5680 5672 402f71 RegCloseKey 5671->5672 5671->5680 5672->5678 5673 402f46 RegEnumKeyW 5674 402f4f RegCloseKey 5673->5674 5673->5680 5675 40690a 5 API calls 5674->5675 5676 402f5f 5675->5676 5676->5678 5679 402f63 RegDeleteKeyW 5676->5679 5677 402ea9 6 API calls 5677->5680 5678->5666 5679->5678 5680->5672 5680->5673 5680->5674 5680->5677 5681 401735 5682 402da6 17 API calls 5681->5682 5683 40173c SearchPathW 5682->5683 5684 401757 5683->5684 5685 4014b8 5686 4014be 5685->5686 5687 401389 2 API calls 5686->5687 5688 4014c6 5687->5688 5689 401d38 5690 402d84 17 API calls 5689->5690 5691 401d3f 5690->5691 5692 402d84 17 API calls 5691->5692 5693 401d4b GetDlgItem 5692->5693 5694 402638 5693->5694 5695 6e382d43 5696 6e382d5b 5695->5696 5697 6e38162f 2 API calls 5696->5697 5698 6e382d76 5697->5698 5699 40263e 5700 402652 5699->5700 5701 40266d 5699->5701 5702 402d84 17 API calls 5700->5702 5703 402672 5701->5703 5704 40269d 5701->5704 5710 402659 5702->5710 5705 402da6 17 API calls 5703->5705 5706 402da6 17 API calls 5704->5706 5707 402679 5705->5707 5708 4026a4 lstrlenW 5706->5708 5716 40655f WideCharToMultiByte 5707->5716 5708->5710 5712 4026e7 5710->5712 5714 40610e 5 API calls 5710->5714 5715 4026d1 5710->5715 5711 40268d lstrlenA 5711->5710 5713 4060df WriteFile 5713->5712 5714->5715 5715->5712 5715->5713 5716->5711

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 40352d-40357d SetErrorMode GetVersionExW 1 4035b7-4035be 0->1 2 40357f-4035b3 GetVersionExW 0->2 3 4035c0 1->3 4 4035c8-403608 1->4 2->1 3->4 5 40360a-403612 call 40690a 4->5 6 40361b 4->6 5->6 11 403614 5->11 8 403620-403634 call 40689a lstrlenA 6->8 13 403636-403652 call 40690a * 3 8->13 11->6 20 403663-4036c5 #17 OleInitialize SHGetFileInfoW call 40653d GetCommandLineW call 40653d 13->20 21 403654-40365a 13->21 28 4036c7-4036c9 20->28 29 4036ce-4036e1 call 405e39 CharNextW 20->29 21->20 25 40365c 21->25 25->20 28->29 32 4037d8-4037de 29->32 33 4037e4 32->33 34 4036e6-4036ec 32->34 35 4037f8-403812 GetTempPathW call 4034fc 33->35 36 4036f5-4036fb 34->36 37 4036ee-4036f3 34->37 46 403814-403832 GetWindowsDirectoryW lstrcatW call 4034fc 35->46 47 40386a-403882 DeleteFileW call 40307d 35->47 39 403702-403706 36->39 40 4036fd-403701 36->40 37->36 37->37 41 4037c6-4037d4 call 405e39 39->41 42 40370c-403712 39->42 40->39 41->32 57 4037d6-4037d7 41->57 44 403714-40371b 42->44 45 40372c-403765 42->45 49 403722 44->49 50 40371d-403720 44->50 51 403781-4037bb 45->51 52 403767-40376c 45->52 46->47 66 403834-403864 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fc 46->66 62 403888-40388e 47->62 63 403a59-403a67 call 403b12 OleUninitialize 47->63 49->45 50->45 50->49 60 4037c3-4037c5 51->60 61 4037bd-4037c1 51->61 52->51 58 40376e-403776 52->58 57->32 64 403778-40377b 58->64 65 40377d 58->65 60->41 61->60 67 4037e6-4037f3 call 40653d 61->67 68 403894-4038a7 call 405e39 62->68 69 403935-40393c call 403bec 62->69 79 403a69-403a78 call 405b9d ExitProcess 63->79 80 403a7e-403a84 63->80 64->51 64->65 65->51 66->47 66->63 67->35 81 4038f9-403906 68->81 82 4038a9-4038de 68->82 78 403941-403944 69->78 78->63 84 403a86-403a9b GetCurrentProcess OpenProcessToken 80->84 85 403afc-403b04 80->85 89 403908-403916 call 405f14 81->89 90 403949-40395d call 405b08 lstrcatW 81->90 86 4038e0-4038e4 82->86 92 403acc-403ada call 40690a 84->92 93 403a9d-403ac6 LookupPrivilegeValueW AdjustTokenPrivileges 84->93 87 403b06 85->87 88 403b09-403b0c ExitProcess 85->88 95 4038e6-4038eb 86->95 96 4038ed-4038f5 86->96 87->88 89->63 107 40391c-403932 call 40653d * 2 89->107 105 40396a-403984 lstrcatW lstrcmpiW 90->105 106 40395f-403965 lstrcatW 90->106 103 403ae8-403af3 ExitWindowsEx 92->103 104 403adc-403ae6 92->104 93->92 95->96 100 4038f7 95->100 96->86 96->100 100->81 103->85 108 403af5-403af7 call 40140b 103->108 104->103 104->108 109 403a57 105->109 110 40398a-40398d 105->110 106->105 107->69 108->85 109->63 115 403996 call 405aeb 110->115 116 40398f-403994 call 405a6e 110->116 120 40399b-4039ab SetCurrentDirectoryW 115->120 116->120 123 4039b8-4039e4 call 40653d 120->123 124 4039ad-4039b3 call 40653d 120->124 128 4039e9-403a04 call 40657a DeleteFileW 123->128 124->123 131 403a44-403a4e 128->131 132 403a06-403a16 CopyFileW 128->132 131->128 133 403a50-403a52 call 4062fd 131->133 132->131 134 403a18-403a38 call 4062fd call 40657a call 405b20 132->134 133->109 134->131 142 403a3a-403a41 CloseHandle 134->142 142->131
                      APIs
                      • SetErrorMode.KERNELBASE(00008001), ref: 00403550
                      • GetVersionExW.KERNEL32(?), ref: 00403579
                      • GetVersionExW.KERNEL32(0000011C), ref: 00403590
                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403627
                      • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403663
                      • OleInitialize.OLE32(00000000), ref: 0040366A
                      • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 00403688
                      • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 0040369D
                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\rCOTA____OMAGNA.exe",00000020,"C:\Users\user\Desktop\rCOTA____OMAGNA.exe",00000000), ref: 004036D6
                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 00403809
                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040381A
                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403826
                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040383A
                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403842
                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403853
                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040385B
                      • DeleteFileW.KERNELBASE(1033), ref: 0040386F
                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403956
                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 00403965
                        • Part of subcall function 00405AEB: CreateDirectoryW.KERNELBASE(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403970
                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rCOTA____OMAGNA.exe",00000000,?), ref: 0040397C
                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040399C
                      • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00436000,?), ref: 004039FB
                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\rCOTA____OMAGNA.exe,0042AA28,00000001), ref: 00403A0E
                      • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403A3B
                      • OleUninitialize.OLE32(?), ref: 00403A5E
                      • ExitProcess.KERNEL32 ref: 00403A78
                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A8C
                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA7
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AC6
                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AEB
                      • ExitProcess.KERNEL32 ref: 00403B0C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                      • String ID: "C:\Users\user\Desktop\rCOTA____OMAGNA.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\codette\darning$C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes$C:\Users\user\Desktop$C:\Users\user\Desktop\rCOTA____OMAGNA.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                      • API String ID: 3859024572-3109318725
                      • Opcode ID: 0340decfa282c2fa59d2a877b7bd384f1d4c4b4cd05ee0b3cbaa4618d7762049
                      • Instruction ID: 4d4dc0a58e4858e72561def8a0259f0227da8af974c10a5ea2b310ef4b80d7a5
                      • Opcode Fuzzy Hash: 0340decfa282c2fa59d2a877b7bd384f1d4c4b4cd05ee0b3cbaa4618d7762049
                      • Instruction Fuzzy Hash: 66E10670A00214AADB10AFB59D45BAF3AB8EF4470AF14847FF545B22D1DB7C8A41CB6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 572 405c49-405c6f call 405f14 575 405c71-405c83 DeleteFileW 572->575 576 405c88-405c8f 572->576 577 405e05-405e09 575->577 578 405c91-405c93 576->578 579 405ca2-405cb2 call 40653d 576->579 581 405db3-405db8 578->581 582 405c99-405c9c 578->582 585 405cc1-405cc2 call 405e58 579->585 586 405cb4-405cbf lstrcatW 579->586 581->577 584 405dba-405dbd 581->584 582->579 582->581 587 405dc7-405dcf call 406873 584->587 588 405dbf-405dc5 584->588 589 405cc7-405ccb 585->589 586->589 587->577 596 405dd1-405de5 call 405e0c call 405c01 587->596 588->577 592 405cd7-405cdd lstrcatW 589->592 593 405ccd-405cd5 589->593 595 405ce2-405cfe lstrlenW FindFirstFileW 592->595 593->592 593->595 597 405d04-405d0c 595->597 598 405da8-405dac 595->598 614 405de7-405dea 596->614 615 405dfd-405e00 call 40559f 596->615 601 405d2c-405d40 call 40653d 597->601 602 405d0e-405d16 597->602 598->581 600 405dae 598->600 600->581 612 405d42-405d4a 601->612 613 405d57-405d62 call 405c01 601->613 604 405d18-405d20 602->604 605 405d8b-405d9b FindNextFileW 602->605 604->601 609 405d22-405d2a 604->609 605->597 608 405da1-405da2 FindClose 605->608 608->598 609->601 609->605 612->605 617 405d4c-405d55 call 405c49 612->617 625 405d83-405d86 call 40559f 613->625 626 405d64-405d67 613->626 614->588 616 405dec-405dfb call 40559f call 4062fd 614->616 615->577 616->577 617->605 625->605 628 405d69-405d79 call 40559f call 4062fd 626->628 629 405d7b-405d81 626->629 628->605 629->605
                      APIs
                      • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C72
                      • lstrcatW.KERNEL32(0042F270,\*.*), ref: 00405CBA
                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405CDD
                      • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CE3
                      • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CF3
                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D93
                      • FindClose.KERNEL32(00000000), ref: 00405DA2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                      • String ID: .$.$C:\Users\user\AppData\Local\Temp\$\*.*
                      • API String ID: 2035342205-1049245928
                      • Opcode ID: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                      • Instruction ID: 8b2ee76931e9ba666d6dc67a471f1b560bbb00ea1adf29c264b32972d7114dcf
                      • Opcode Fuzzy Hash: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                      • Instruction Fuzzy Hash: 3D41A130900A14BADB216B65CC8DABF7678DF81714F14817FF841B21D1D77C4A819EAE
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindFirstFileW.KERNELBASE(75923420,004302B8,0042FA70,00405F5D,0042FA70,0042FA70,00000000,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 0040687E
                      • FindClose.KERNEL32(00000000), ref: 0040688A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Find$CloseFileFirst
                      • String ID:
                      • API String ID: 2295610775-0
                      • Opcode ID: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                      • Instruction ID: 67599a3b69382adcf67454a25bfea179debcebd0a6e2e92eb77ede12202c023a
                      • Opcode Fuzzy Hash: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                      • Instruction Fuzzy Hash: C3D012325192205FC3402B386E0C84B7A989F16331726CB76B4AAF51E0D7388C7387BD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 143 404f06-404f52 GetDlgItem * 2 144 404f58-404ff0 GlobalAlloc LoadImageW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 143->144 145 40517d-405184 143->145 148 404ff2-404ffd SendMessageW 144->148 149 404fff-405006 DeleteObject 144->149 146 405186-405196 145->146 147 405198 145->147 150 40519b-4051a4 146->150 147->150 148->149 151 405008-405010 149->151 152 4051a6-4051a9 150->152 153 4051af-4051b5 150->153 154 405012-405015 151->154 155 405039-40503d 151->155 152->153 157 405293-40529a 152->157 158 4051c4-4051cb 153->158 159 4051b7-4051be 153->159 160 405017 154->160 161 40501a-405037 call 40657a SendMessageW * 2 154->161 155->151 156 40503f-40506f call 404499 * 2 155->156 199 405075-40507b 156->199 200 40513f-405152 GetWindowLongW SetWindowLongW 156->200 163 40530b-405313 157->163 164 40529c-4052a2 157->164 165 405240-405243 158->165 166 4051cd-4051d0 158->166 159->157 159->158 160->161 161->155 172 405315-40531b SendMessageW 163->172 173 40531d-405324 163->173 169 4052a8-4052b2 164->169 170 4054fe-405510 call 404500 164->170 165->157 171 405245-40524f 165->171 174 4051d2-4051d9 166->174 175 4051db-4051f0 call 404e54 166->175 169->170 181 4052b8-4052c7 SendMessageW 169->181 182 405251-40525d SendMessageW 171->182 183 40525f-405269 171->183 172->173 177 405326-40532d 173->177 178 405358-40535f 173->178 174->165 174->175 175->165 198 4051f2-405203 175->198 187 405336-40533d 177->187 188 40532f-405330 ImageList_Destroy 177->188 191 4054c0-4054c7 178->191 192 405365-405371 call 4011ef 178->192 181->170 193 4052cd-4052de SendMessageW 181->193 182->183 183->157 185 40526b-405275 183->185 194 405286-405290 185->194 195 405277-405284 185->195 196 405346-405352 187->196 197 40533f-405340 GlobalFree 187->197 188->187 191->170 204 4054c9-4054d0 191->204 217 405381-405384 192->217 218 405373-405376 192->218 202 4052e0-4052e6 193->202 203 4052e8-4052ea 193->203 194->157 195->157 196->178 197->196 198->165 206 405205-405207 198->206 207 40507e-405084 199->207 205 405158-40515b 200->205 202->203 209 4052eb-405304 call 401299 SendMessageW 202->209 203->209 204->170 210 4054d2-4054fc ShowWindow GetDlgItem ShowWindow 204->210 211 405175-405178 call 4044ce 205->211 212 40515d-405170 ShowWindow call 4044ce 205->212 213 405209-405210 206->213 214 40521a 206->214 215 405121-405134 207->215 216 40508a-4050b5 207->216 209->163 210->170 211->145 212->170 222 405212-405214 213->222 223 405216-405218 213->223 224 40521d-405239 call 40117d 214->224 215->207 230 40513a-40513d 215->230 225 4050f1-4050f3 216->225 226 4050b7-4050ef SendMessageW 216->226 231 4053c5-4053e9 call 4011ef 217->231 232 405386-40539f call 4012e2 call 401299 217->232 227 405378 218->227 228 405379-40537c call 404ed4 218->228 222->224 223->224 224->165 236 4050f5-405107 SendMessageW 225->236 237 405109-40511e SendMessageW 225->237 226->215 227->228 228->217 230->200 230->205 244 40548b-405494 231->244 245 4053ef 231->245 250 4053a1-4053a7 232->250 251 4053af-4053be SendMessageW 232->251 236->215 237->215 247 4054a2-4054aa 244->247 248 405496-40549c InvalidateRect 244->248 249 4053f2-4053fd 245->249 247->191 254 4054ac-4054bb call 404e27 call 404e0f 247->254 248->247 252 405473-405485 249->252 253 4053ff-40540e 249->253 255 4053a9 250->255 256 4053aa-4053ad 250->256 251->231 252->244 252->249 258 405410-40541d 253->258 259 405421-405424 253->259 254->191 255->256 256->250 256->251 258->259 260 405426-405429 259->260 261 40542b-405434 259->261 263 405439-405471 SendMessageW * 2 260->263 261->263 264 405436 261->264 263->252 264->263
                      APIs
                      • GetDlgItem.USER32(?,000003F9), ref: 00404F1E
                      • GetDlgItem.USER32(?,00000408), ref: 00404F29
                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F73
                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F8A
                      • SetWindowLongW.USER32(?,000000FC,00405513), ref: 00404FA3
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FB7
                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FC9
                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDF
                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FEB
                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FFD
                      • DeleteObject.GDI32(00000000), ref: 00405000
                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                        • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                      • GetWindowLongW.USER32(?,000000F0), ref: 00405144
                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405152
                      • ShowWindow.USER32(?,00000005), ref: 00405162
                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040525D
                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C2
                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052D7
                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052FB
                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040531B
                      • ImageList_Destroy.COMCTL32(?), ref: 00405330
                      • GlobalFree.KERNEL32(?), ref: 00405340
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053B9
                      • SendMessageW.USER32(?,00001102,?,?), ref: 00405462
                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405471
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0040549C
                      • ShowWindow.USER32(?,00000000), ref: 004054EA
                      • GetDlgItem.USER32(?,000003FE), ref: 004054F5
                      • ShowWindow.USER32(00000000), ref: 004054FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                      • String ID: $M$N$rJR
                      • API String ID: 2564846305-2955959312
                      • Opcode ID: f3ae30c2f01d96fa342d0084a15794205f6c53b1aff7f3381a712084abd192f5
                      • Instruction ID: 669472b6e39b4296dbb294a81ed98d86f32f22d8abeb4cff7518c6a892085abf
                      • Opcode Fuzzy Hash: f3ae30c2f01d96fa342d0084a15794205f6c53b1aff7f3381a712084abd192f5
                      • Instruction Fuzzy Hash: EF028A70900608EFDB20DFA9DD45AAF7BB5FB84314F10817AE610BA2E0D7799942DF58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 266 403f9a-403fac 267 403fb2-403fb8 266->267 268 404113-404122 266->268 267->268 269 403fbe-403fc7 267->269 270 404171-404186 268->270 271 404124-40416c GetDlgItem * 2 call 404499 SetClassLongW call 40140b 268->271 272 403fc9-403fd6 SetWindowPos 269->272 273 403fdc-403fe3 269->273 275 4041c6-4041cb call 4044e5 270->275 276 404188-40418b 270->276 271->270 272->273 278 403fe5-403fff ShowWindow 273->278 279 404027-40402d 273->279 285 4041d0-4041eb 275->285 281 40418d-404198 call 401389 276->281 282 4041be-4041c0 276->282 286 404100-40410e call 404500 278->286 287 404005-404018 GetWindowLongW 278->287 288 404046-404049 279->288 289 40402f-404041 DestroyWindow 279->289 281->282 301 40419a-4041b9 SendMessageW 281->301 282->275 284 404466 282->284 296 404468-40446f 284->296 293 4041f4-4041fa 285->293 294 4041ed-4041ef call 40140b 285->294 286->296 287->286 295 40401e-404021 ShowWindow 287->295 299 40404b-404057 SetWindowLongW 288->299 300 40405c-404062 288->300 297 404443-404449 289->297 305 404200-40420b 293->305 306 404424-40443d DestroyWindow EndDialog 293->306 294->293 295->279 297->284 304 40444b-404451 297->304 299->296 300->286 307 404068-404077 GetDlgItem 300->307 301->296 304->284 310 404453-40445c ShowWindow 304->310 305->306 311 404211-40425e call 40657a call 404499 * 3 GetDlgItem 305->311 306->297 308 404096-404099 307->308 309 404079-404090 SendMessageW IsWindowEnabled 307->309 312 40409b-40409c 308->312 313 40409e-4040a1 308->313 309->284 309->308 310->284 338 404260-404265 311->338 339 404268-4042a4 ShowWindow KiUserCallbackDispatcher call 4044bb EnableWindow 311->339 315 4040cc-4040d1 call 404472 312->315 316 4040a3-4040a9 313->316 317 4040af-4040b4 313->317 315->286 319 4040ea-4040fa SendMessageW 316->319 320 4040ab-4040ad 316->320 317->319 321 4040b6-4040bc 317->321 319->286 320->315 324 4040d3-4040dc call 40140b 321->324 325 4040be-4040c4 call 40140b 321->325 324->286 334 4040de-4040e8 324->334 336 4040ca 325->336 334->336 336->315 338->339 342 4042a6-4042a7 339->342 343 4042a9 339->343 344 4042ab-4042d9 GetSystemMenu EnableMenuItem SendMessageW 342->344 343->344 345 4042db-4042ec SendMessageW 344->345 346 4042ee 344->346 347 4042f4-404333 call 4044ce call 403f7b call 40653d lstrlenW call 40657a SetWindowTextW call 401389 345->347 346->347 347->285 358 404339-40433b 347->358 358->285 359 404341-404345 358->359 360 404364-404378 DestroyWindow 359->360 361 404347-40434d 359->361 360->297 363 40437e-4043ab CreateDialogParamW 360->363 361->284 362 404353-404359 361->362 362->285 364 40435f 362->364 363->297 365 4043b1-404408 call 404499 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 363->365 364->284 365->284 370 40440a-404422 ShowWindow call 4044e5 365->370 370->297
                      APIs
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FD6
                      • ShowWindow.USER32(?), ref: 00403FF6
                      • GetWindowLongW.USER32(?,000000F0), ref: 00404008
                      • ShowWindow.USER32(?,00000004), ref: 00404021
                      • DestroyWindow.USER32 ref: 00404035
                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040404E
                      • GetDlgItem.USER32(?,?), ref: 0040406D
                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404081
                      • IsWindowEnabled.USER32(00000000), ref: 00404088
                      • GetDlgItem.USER32(?,00000001), ref: 00404133
                      • GetDlgItem.USER32(?,00000002), ref: 0040413D
                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404157
                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A8
                      • GetDlgItem.USER32(?,00000003), ref: 0040424E
                      • ShowWindow.USER32(00000000,?), ref: 0040426F
                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404281
                      • EnableWindow.USER32(?,?), ref: 0040429C
                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B2
                      • EnableMenuItem.USER32(00000000), ref: 004042B9
                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D1
                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042E4
                      • lstrlenW.KERNEL32(0042D268,?,0042D268,00000000), ref: 0040430E
                      • SetWindowTextW.USER32(?,0042D268), ref: 00404322
                      • ShowWindow.USER32(?,0000000A), ref: 00404456
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                      • String ID:
                      • API String ID: 121052019-0
                      • Opcode ID: eac8f99d64be9f6d492fbe04e6b7d0d7f3e751454adab84b791eaff5eeb7ac8b
                      • Instruction ID: 19e8ffe36521fda3862950d2389d84f1ef0c133ac5ff71005f69e3a94542e2f3
                      • Opcode Fuzzy Hash: eac8f99d64be9f6d492fbe04e6b7d0d7f3e751454adab84b791eaff5eeb7ac8b
                      • Instruction Fuzzy Hash: DDC1A1B1A00704ABDB206F61EE49E2B3A68FB84746F15053EF741B61F1CB799841DB2D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 373 403bec-403c04 call 40690a 376 403c06-403c16 call 406484 373->376 377 403c18-403c4f call 40640b 373->377 385 403c72-403c9b call 403ec2 call 405f14 376->385 382 403c51-403c62 call 40640b 377->382 383 403c67-403c6d lstrcatW 377->383 382->383 383->385 391 403ca1-403ca6 385->391 392 403d2d-403d35 call 405f14 385->392 391->392 393 403cac-403cc6 call 40640b 391->393 398 403d43-403d68 LoadImageW 392->398 399 403d37-403d3e call 40657a 392->399 397 403ccb-403cd4 393->397 397->392 400 403cd6-403cda 397->400 402 403de9-403df1 call 40140b 398->402 403 403d6a-403d9a RegisterClassW 398->403 399->398 407 403cec-403cf8 lstrlenW 400->407 408 403cdc-403ce9 call 405e39 400->408 415 403df3-403df6 402->415 416 403dfb-403e06 call 403ec2 402->416 404 403da0-403de4 SystemParametersInfoW CreateWindowExW 403->404 405 403eb8 403->405 404->402 413 403eba-403ec1 405->413 409 403d20-403d28 call 405e0c call 40653d 407->409 410 403cfa-403d08 lstrcmpiW 407->410 408->407 409->392 410->409 414 403d0a-403d14 GetFileAttributesW 410->414 419 403d16-403d18 414->419 420 403d1a-403d1b call 405e58 414->420 415->413 426 403e0c-403e26 ShowWindow call 40689a 416->426 427 403e8f-403e97 call 405672 416->427 419->409 419->420 420->409 434 403e32-403e44 GetClassInfoW 426->434 435 403e28-403e2d call 40689a 426->435 432 403eb1-403eb3 call 40140b 427->432 433 403e99-403e9f 427->433 432->405 433->415 436 403ea5-403eac call 40140b 433->436 439 403e46-403e56 GetClassInfoW RegisterClassW 434->439 440 403e5c-403e7f DialogBoxParamW call 40140b 434->440 435->434 436->415 439->440 443 403e84-403e8d call 403b3c 440->443 443->413
                      APIs
                        • Part of subcall function 0040690A: GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                        • Part of subcall function 0040690A: GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                      • lstrcatW.KERNEL32(1033,0042D268), ref: 00403C6D
                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\codette\darning,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75923420), ref: 00403CED
                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\codette\darning,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 00403D00
                      • GetFileAttributesW.KERNEL32(Call,?,00000000,?), ref: 00403D0B
                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\codette\darning), ref: 00403D54
                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                      • RegisterClassW.USER32(00433EA0), ref: 00403D91
                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DA9
                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DDE
                      • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403E14
                      • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403E40
                      • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403E4D
                      • RegisterClassW.USER32(00433EA0), ref: 00403E56
                      • DialogBoxParamW.USER32(?,00000000,00403F9A,00000000), ref: 00403E75
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                      • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\codette\darning$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                      • API String ID: 1975747703-1632426978
                      • Opcode ID: 3acf68a30cd81ad10c185f2e4687b0a56a29c9ac1ac5e4c2a87dd23a2b2e0500
                      • Instruction ID: 6cc527b2f10929733706d009ff8c1d9b21e511251dd9cb17fe62514cef47010a
                      • Opcode Fuzzy Hash: 3acf68a30cd81ad10c185f2e4687b0a56a29c9ac1ac5e4c2a87dd23a2b2e0500
                      • Instruction Fuzzy Hash: F561A670140300BED721AF66ED46F2B3A6CEB84B5AF40453FF945B62E2CB7D59018A6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 447 40307d-4030cb GetTickCount GetModuleFileNameW call 40602d 450 4030d7-403105 call 40653d call 405e58 call 40653d GetFileSize 447->450 451 4030cd-4030d2 447->451 459 4031f0-4031fe call 403019 450->459 460 40310b 450->460 452 4032ad-4032b1 451->452 467 403200-403203 459->467 468 403253-403258 459->468 462 403110-403127 460->462 464 403129 462->464 465 40312b-403134 call 4034cf 462->465 464->465 472 40325a-403262 call 403019 465->472 473 40313a-403141 465->473 470 403205-40321d call 4034e5 call 4034cf 467->470 471 403227-403251 GlobalAlloc call 4034e5 call 4032b4 467->471 468->452 470->468 493 40321f-403225 470->493 471->468 498 403264-403275 471->498 472->468 477 403143-403157 call 405fe8 473->477 478 4031bd-4031c1 473->478 483 4031cb-4031d1 477->483 496 403159-403160 477->496 482 4031c3-4031ca call 403019 478->482 478->483 482->483 489 4031e0-4031e8 483->489 490 4031d3-4031dd call 4069f7 483->490 489->462 497 4031ee 489->497 490->489 493->468 493->471 496->483 500 403162-403169 496->500 497->459 501 403277 498->501 502 40327d-403282 498->502 500->483 504 40316b-403172 500->504 501->502 503 403283-403289 502->503 503->503 505 40328b-4032a6 SetFilePointer call 405fe8 503->505 504->483 506 403174-40317b 504->506 509 4032ab 505->509 506->483 508 40317d-40319d 506->508 508->468 510 4031a3-4031a7 508->510 509->452 511 4031a9-4031ad 510->511 512 4031af-4031b7 510->512 511->497 511->512 512->483 513 4031b9-4031bb 512->513 513->483
                      APIs
                      • GetTickCount.KERNEL32 ref: 0040308E
                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,00000400,?,?,?,?,?,0040387D,?), ref: 004030AA
                        • Part of subcall function 0040602D: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                        • Part of subcall function 0040602D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                      • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,80000000,00000003,?,?,?,?,?,0040387D), ref: 004030F6
                      • GlobalAlloc.KERNELBASE(00000040,}8@,?,?,?,?,?,0040387D,?), ref: 0040322C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\rCOTA____OMAGNA.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}8@
                      • API String ID: 2803837635-2125716089
                      • Opcode ID: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                      • Instruction ID: 750c061bb954c4555836cecba7cc54c639b148d890841a972b43b12454d44aa7
                      • Opcode Fuzzy Hash: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                      • Instruction Fuzzy Hash: 7951B571904204AFDB10AF65ED42B9E7EACAB48756F14807BF904B62D1C77C9F408B9D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 514 40657a-406585 515 406587-406596 514->515 516 406598-4065ae 514->516 515->516 517 4065b0-4065bd 516->517 518 4065c6-4065cf 516->518 517->518 519 4065bf-4065c2 517->519 520 4065d5 518->520 521 4067aa-4067b5 518->521 519->518 522 4065da-4065e7 520->522 523 4067c0-4067c1 521->523 524 4067b7-4067bb call 40653d 521->524 522->521 525 4065ed-4065f6 522->525 524->523 527 406788 525->527 528 4065fc-406639 525->528 529 406796-406799 527->529 530 40678a-406794 527->530 531 40672c-406731 528->531 532 40663f-406646 528->532 533 40679b-4067a4 529->533 530->533 534 406733-406739 531->534 535 406764-406769 531->535 536 406648-40664a 532->536 537 40664b-40664d 532->537 533->521 538 4065d7 533->538 539 406749-406755 call 40653d 534->539 540 40673b-406747 call 406484 534->540 543 406778-406786 lstrlenW 535->543 544 40676b-406773 call 40657a 535->544 536->537 541 40668a-40668d 537->541 542 40664f-406676 call 40640b 537->542 538->522 555 40675a-406760 539->555 540->555 545 40669d-4066a0 541->545 546 40668f-40669b GetSystemDirectoryW 541->546 559 406713-406717 542->559 561 40667c-406685 call 40657a 542->561 543->533 544->543 552 4066a2-4066b0 GetWindowsDirectoryW 545->552 553 406709-40670b 545->553 551 40670d-406711 546->551 551->559 560 406724-40672a call 4067c4 551->560 552->553 553->551 558 4066b2-4066ba 553->558 555->543 557 406762 555->557 557->560 563 4066d1-4066e7 SHGetSpecialFolderLocation 558->563 564 4066bc-4066c5 558->564 559->560 565 406719-40671f lstrcatW 559->565 560->543 561->551 568 406705 563->568 569 4066e9-406703 SHGetPathFromIDListW CoTaskMemFree 563->569 571 4066cd-4066cf 564->571 565->560 568->553 569->551 569->568 571->551 571->563
                      APIs
                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406695
                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,0042C248,?,004055D6,0042C248,00000000,00000000,00425A20,759223A0), ref: 004066A8
                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                      • lstrlenW.KERNEL32(Call,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Directory$SystemWindowslstrcatlstrlen
                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$rJR
                      • API String ID: 4260037668-2004645991
                      • Opcode ID: 77e2ab9a33f24b2152c01ddcae57aa6579516e8c51fcee03a10f2bfce40d75c6
                      • Instruction ID: 685928b229c5d1fd60d609eb920d771e11fa4d776b5b66b0bad6c944a0f90ddf
                      • Opcode Fuzzy Hash: 77e2ab9a33f24b2152c01ddcae57aa6579516e8c51fcee03a10f2bfce40d75c6
                      • Instruction Fuzzy Hash: 1D61D131900205EADB209F64DD80BAE77A5EF54318F22813BE907B72D0D77D99A1CB5D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 636 4032b4-4032cb 637 4032d4-4032dd 636->637 638 4032cd 636->638 639 4032e6-4032eb 637->639 640 4032df 637->640 638->637 641 4032fb-403308 call 4034cf 639->641 642 4032ed-4032f6 call 4034e5 639->642 640->639 646 4034bd 641->646 647 40330e-403312 641->647 642->641 648 4034bf-4034c0 646->648 649 403468-40346a 647->649 650 403318-403361 GetTickCount 647->650 653 4034c8-4034cc 648->653 651 4034aa-4034ad 649->651 652 40346c-40346f 649->652 654 4034c5 650->654 655 403367-40336f 650->655 656 4034b2-4034bb call 4034cf 651->656 657 4034af 651->657 652->654 658 403471 652->658 654->653 659 403371 655->659 660 403374-403382 call 4034cf 655->660 656->646 668 4034c2 656->668 657->656 662 403474-40347a 658->662 659->660 660->646 670 403388-403391 660->670 665 40347c 662->665 666 40347e-40348c call 4034cf 662->666 665->666 666->646 674 40348e-40349a call 4060df 666->674 668->654 672 403397-4033b7 call 406a65 670->672 677 403460-403462 672->677 678 4033bd-4033d0 GetTickCount 672->678 680 403464-403466 674->680 681 40349c-4034a6 674->681 677->648 682 4033d2-4033da 678->682 683 40341b-40341d 678->683 680->648 681->662 684 4034a8 681->684 685 4033e2-403418 MulDiv wsprintfW call 40559f 682->685 686 4033dc-4033e0 682->686 687 403454-403458 683->687 688 40341f-403423 683->688 684->654 685->683 686->683 686->685 687->655 689 40345e 687->689 691 403425-40342c call 4060df 688->691 692 40343a-403445 688->692 689->654 697 403431-403433 691->697 695 403448-40344c 692->695 695->672 696 403452 695->696 696->654 697->680 698 403435-403438 697->698 698->695
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CountTick$wsprintf
                      • String ID: *B$ ZB$ A$ A$... %d%%$}8@
                      • API String ID: 551687249-3683892814
                      • Opcode ID: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                      • Instruction ID: 54ab186c05730647c672001b6e56d135182c7b51176e178f40f708a1e84a381e
                      • Opcode Fuzzy Hash: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                      • Instruction Fuzzy Hash: E251BD31810219EBCF11DF65DA44B9E7BB8AF05756F10827BE804BB2C1D7789E44CBA9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 699 40176f-401794 call 402da6 call 405e83 704 401796-40179c call 40653d 699->704 705 40179e-4017b0 call 40653d call 405e0c lstrcatW 699->705 710 4017b5-4017b6 call 4067c4 704->710 705->710 714 4017bb-4017bf 710->714 715 4017c1-4017cb call 406873 714->715 716 4017f2-4017f5 714->716 724 4017dd-4017ef 715->724 725 4017cd-4017db CompareFileTime 715->725 717 4017f7-4017f8 call 406008 716->717 718 4017fd-401819 call 40602d 716->718 717->718 726 40181b-40181e 718->726 727 40188d-4018b6 call 40559f call 4032b4 718->727 724->716 725->724 728 401820-40185e call 40653d * 2 call 40657a call 40653d call 405b9d 726->728 729 40186f-401879 call 40559f 726->729 739 4018b8-4018bc 727->739 740 4018be-4018ca SetFileTime 727->740 728->714 761 401864-401865 728->761 741 401882-401888 729->741 739->740 743 4018d0-4018db FindCloseChangeNotification 739->743 740->743 744 402c33 741->744 746 4018e1-4018e4 743->746 747 402c2a-402c2d 743->747 748 402c35-402c39 744->748 750 4018e6-4018f7 call 40657a lstrcatW 746->750 751 4018f9-4018fc call 40657a 746->751 747->744 758 401901-402398 750->758 751->758 762 40239d-4023a2 758->762 763 402398 call 405b9d 758->763 761->741 764 401867-401868 761->764 762->748 763->762 764->729
                      APIs
                      • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes,?,?,00000031), ref: 004017D5
                        • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(0042C248,00000000,00425A20,759223A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,0042C248,00000000,00425A20,759223A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(0042C248,00403418), ref: 004055FA
                        • Part of subcall function 0040559F: SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                      • String ID: C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes$C:\Users\user\AppData\Local\Temp\nsfA826.tmp$C:\Users\user\AppData\Local\Temp\nsfA826.tmp\System.dll$Call
                      • API String ID: 1941528284-1072504571
                      • Opcode ID: c3274d726aec4ef64f4a9bedf6e6abb76bf18de80f90b552e6f9c42024a1c74a
                      • Instruction ID: 1e3f5e060805a06bac003644be00ba5f3fef1f2c353f2d3d357c0a6c5ca497fd
                      • Opcode Fuzzy Hash: c3274d726aec4ef64f4a9bedf6e6abb76bf18de80f90b552e6f9c42024a1c74a
                      • Instruction Fuzzy Hash: F4419371900108BACF11BFB5DD85DAE7A79EF45768B20423FF422B10E2D63C8A91966D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 765 4026ec-402705 call 402d84 768 402c2a-402c2d 765->768 769 40270b-402712 765->769 772 402c33-402c39 768->772 770 402714 769->770 771 402717-40271a 769->771 770->771 773 402720-40272f call 40649d 771->773 774 40287e-402886 771->774 773->774 778 402735 773->778 774->768 779 40273b-40273f 778->779 780 4027d4-4027d7 779->780 781 402745-402760 ReadFile 779->781 783 4027d9-4027dc 780->783 784 4027ef-4027ff call 4060b0 780->784 781->774 782 402766-40276b 781->782 782->774 786 402771-40277f 782->786 783->784 787 4027de-4027e9 call 40610e 783->787 784->774 792 402801 784->792 789 402785-402797 MultiByteToWideChar 786->789 790 40283a-402846 call 406484 786->790 787->774 787->784 789->792 793 402799-40279c 789->793 790->772 796 402804-402807 792->796 797 40279e-4027a9 793->797 796->790 799 402809-40280e 796->799 797->796 800 4027ab-4027d0 SetFilePointer MultiByteToWideChar 797->800 801 402810-402815 799->801 802 40284b-40284f 799->802 800->797 803 4027d2 800->803 801->802 804 402817-40282a 801->804 805 402851-402855 802->805 806 40286c-402878 SetFilePointer 802->806 803->792 804->774 807 40282c-402832 804->807 808 402857-40285b 805->808 809 40285d-40286a 805->809 806->774 807->779 810 402838 807->810 808->806 808->809 809->774 810->774
                      APIs
                      • ReadFile.KERNELBASE(?,?,?,?), ref: 00402758
                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                      • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                        • Part of subcall function 0040610E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406124
                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: File$Pointer$ByteCharMultiWide$Read
                      • String ID: 9
                      • API String ID: 163830602-2366072709
                      • Opcode ID: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                      • Instruction ID: 36eba916602f65c1f8b814f2f26102ddc75cc08ed25eda7b441ea0696c55e726
                      • Opcode Fuzzy Hash: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                      • Instruction Fuzzy Hash: C551E975D00219AADF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 811 40689a-4068ba GetSystemDirectoryW 812 4068bc 811->812 813 4068be-4068c0 811->813 812->813 814 4068d1-4068d3 813->814 815 4068c2-4068cb 813->815 817 4068d4-406907 wsprintfW LoadLibraryExW 814->817 815->814 816 4068cd-4068cf 815->816 816->817
                      APIs
                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                      • wsprintfW.USER32 ref: 004068EC
                      • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406900
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: DirectoryLibraryLoadSystemwsprintf
                      • String ID: %s%S.dll$UXTHEME$\
                      • API String ID: 2200240437-1946221925
                      • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                      • Instruction ID: 21628a1c63ce2f140fdd4d546058f3b0ba52bdb51e88dcb335987c0e659eada7
                      • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                      • Instruction Fuzzy Hash: D0F0F671511119ABDB10BB64DD0DF9B376CBF00305F10847AA646F10D0EB7CDA68CBA8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 818 405a6e-405ab9 CreateDirectoryW 819 405abb-405abd 818->819 820 405abf-405acc GetLastError 818->820 821 405ae6-405ae8 819->821 820->821 822 405ace-405ae2 SetFileSecurityW 820->822 822->819 823 405ae4 GetLastError 822->823 823->821
                      APIs
                      • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                      • GetLastError.KERNEL32 ref: 00405AC5
                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADA
                      • GetLastError.KERNEL32 ref: 00405AE4
                      Strings
                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A94
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                      • String ID: C:\Users\user\AppData\Local\Temp\
                      • API String ID: 3449924974-823278215
                      • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                      • Instruction ID: 637b0a295f6611997b04f2fb2f8121e2d74ae93851c1d74b8ff7b710bfe1865b
                      • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                      • Instruction Fuzzy Hash: 1A010871D04219EAEF019BA0DD84BEFBBB4EB14314F00813AD545B6281E7789648CFE9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 824 6e381817-6e381856 call 6e381bff 828 6e38185c-6e381860 824->828 829 6e381976-6e381978 824->829 830 6e381869-6e381876 call 6e382480 828->830 831 6e381862-6e381868 call 6e38243e 828->831 836 6e381878-6e38187d 830->836 837 6e3818a6-6e3818ad 830->837 831->830 840 6e381898-6e38189b 836->840 841 6e38187f-6e381880 836->841 838 6e3818cd-6e3818d1 837->838 839 6e3818af-6e3818cb call 6e382655 call 6e381654 call 6e381312 GlobalFree 837->839 846 6e38191e-6e381924 call 6e382655 838->846 847 6e3818d3-6e38191c call 6e381666 call 6e382655 838->847 863 6e381925-6e381929 839->863 840->837 842 6e38189d-6e38189e call 6e382e23 840->842 844 6e381888-6e381889 call 6e382b98 841->844 845 6e381882-6e381883 841->845 855 6e3818a3 842->855 858 6e38188e 844->858 851 6e381890-6e381896 call 6e382810 845->851 852 6e381885-6e381886 845->852 846->863 847->863 862 6e3818a5 851->862 852->837 852->844 855->862 858->855 862->837 867 6e38192b-6e381939 call 6e382618 863->867 868 6e381966-6e38196d 863->868 874 6e38193b-6e38193e 867->874 875 6e381951-6e381958 867->875 868->829 870 6e38196f-6e381970 GlobalFree 868->870 870->829 874->875 876 6e381940-6e381948 874->876 875->868 877 6e38195a-6e381965 call 6e3815dd 875->877 876->875 878 6e38194a-6e38194b FreeLibrary 876->878 877->868 878->875
                      APIs
                        • Part of subcall function 6E381BFF: GlobalFree.KERNEL32(?), ref: 6E381E74
                        • Part of subcall function 6E381BFF: GlobalFree.KERNEL32(?), ref: 6E381E79
                        • Part of subcall function 6E381BFF: GlobalFree.KERNEL32(?), ref: 6E381E7E
                      • GlobalFree.KERNEL32(00000000), ref: 6E3818C5
                      • FreeLibrary.KERNEL32(?), ref: 6E38194B
                      • GlobalFree.KERNEL32(00000000), ref: 6E381970
                        • Part of subcall function 6E38243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6E38246F
                        • Part of subcall function 6E382810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E381896,00000000), ref: 6E3828E0
                        • Part of subcall function 6E381666: wsprintfW.USER32 ref: 6E381694
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$Free$Alloc$Librarywsprintf
                      • String ID:
                      • API String ID: 3962662361-3916222277
                      • Opcode ID: f8a649dfb953cd4dc17e3087f9d8d86e1ce837da99e7e1faf8df8cd1acb57063
                      • Instruction ID: d18efa530385bfc7e81d02f5960193f8e92e90eb8f635d1485e558a5f356aad0
                      • Opcode Fuzzy Hash: f8a649dfb953cd4dc17e3087f9d8d86e1ce837da99e7e1faf8df8cd1acb57063
                      • Instruction Fuzzy Hash: 2441A2B1400206ABDF509FF4D988BD737ACAF06314F1448A5E9B59A08ADBB5818CC7A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 881 401c43-401c63 call 402d84 * 2 886 401c65-401c6c call 402da6 881->886 887 401c6f-401c73 881->887 886->887 889 401c75-401c7c call 402da6 887->889 890 401c7f-401c85 887->890 889->890 893 401cd3-401cfd call 402da6 * 2 FindWindowExW 890->893 894 401c87-401ca3 call 402d84 * 2 890->894 906 401d03 893->906 904 401cc3-401cd1 SendMessageW 894->904 905 401ca5-401cc1 SendMessageTimeoutW 894->905 904->906 907 401d06-401d09 905->907 906->907 908 402c2a-402c39 907->908 909 401d0f 907->909 909->908
                      APIs
                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend$Timeout
                      • String ID: !
                      • API String ID: 1777923405-2657877971
                      • Opcode ID: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                      • Instruction ID: 549e056fbb7746b1afa8e7352ee9f1cbf83a3633853e14f9ff1f16dc1dd81c22
                      • Opcode Fuzzy Hash: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                      • Instruction Fuzzy Hash: 46219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 912 40248a-4024bb call 402da6 * 2 call 402e36 919 4024c1-4024cb 912->919 920 402c2a-402c39 912->920 921 4024cd-4024da call 402da6 lstrlenW 919->921 922 4024de-4024e1 919->922 921->922 925 4024e3-4024f4 call 402d84 922->925 926 4024f5-4024f8 922->926 925->926 930 402509-40251d RegSetValueExW 926->930 931 4024fa-402504 call 4032b4 926->931 932 402522-402603 RegCloseKey 930->932 933 40251f 930->933 931->930 932->920 933->932
                      APIs
                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsfA826.tmp,00000023,00000011,00000002), ref: 004024D5
                      • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsfA826.tmp,00000000,00000011,00000002), ref: 00402515
                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsfA826.tmp,00000000,00000011,00000002), ref: 004025FD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CloseValuelstrlen
                      • String ID: C:\Users\user\AppData\Local\Temp\nsfA826.tmp
                      • API String ID: 2655323295-995327759
                      • Opcode ID: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                      • Instruction ID: a32c4fc66ba480c3aafb49ec1434dbeb720bd0d2787204a1d049ba7b64bbfaa1
                      • Opcode Fuzzy Hash: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                      • Instruction Fuzzy Hash: 8B118E71E00119BEEF10AFA5DE49EAEBAB8FF44358F15443AF504F61C1D7B88D40AA58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetTickCount.KERNEL32 ref: 0040607A
                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,0040352B,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406095
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CountFileNameTempTick
                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                      • API String ID: 1716503409-44229769
                      • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                      • Instruction ID: cc98cbd97bba9fac9576f26979179aa346a2ab2dc3c85b14509754d74f2b81c3
                      • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                      • Instruction Fuzzy Hash: CEF09076B40204FBEB00CF69ED05E9EB7BCEB95750F11803AFA05F7140E6B499648768
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 00405EB7: CharNextW.USER32(?,?,0042FA70,?,00405F2B,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                        • Part of subcall function 00405A6E: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes,?,00000000,000000F0), ref: 0040164D
                      Strings
                      • C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes, xrefs: 00401640
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                      • String ID: C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes
                      • API String ID: 1892508949-3686705221
                      • Opcode ID: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                      • Instruction ID: 910f9ca0e916fbda017ea5bccd1daba2d9720f9cae8b5c5670dceb894c5ef12e
                      • Opcode Fuzzy Hash: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                      • Instruction Fuzzy Hash: 3E11D031504110EBCF216FA5CD4099F36A0EF25369B28493BE945B52F1DA3E4A829A8E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • IsWindowVisible.USER32(?), ref: 00405542
                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405593
                        • Part of subcall function 004044E5: SendMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004044F7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Window$CallMessageProcSendVisible
                      • String ID:
                      • API String ID: 3748168415-3916222277
                      • Opcode ID: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                      • Instruction ID: 904a7c61355239921aaa7855b64c86422fca6e8886f64d9e6fcbc6a993ea73ec
                      • Opcode Fuzzy Hash: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                      • Instruction Fuzzy Hash: F3017CB1100608BFDF209F11DD80AAB3B27EB84754F50453AFA01762D5D77A8E92DA69
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,0042C248,00000000,?,?,Call,?,?,00406672,80000002), ref: 00406451
                      • RegCloseKey.ADVAPI32(?,?,00406672,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,0042C248), ref: 0040645C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CloseQueryValue
                      • String ID: Call
                      • API String ID: 3356406503-1824292864
                      • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                      • Instruction ID: a8d415a3dc4e4479eaaa65942f717852bb8bd3539c12dad3b2e52d491ce509ba
                      • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                      • Instruction Fuzzy Hash: FB017C72510209AADF21CF51CC09EDB3BB8FB54364F01803AFD5AA6190D738D968DBA8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402103
                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(0042C248,00000000,00425A20,759223A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,0042C248,00000000,00425A20,759223A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(0042C248,00403418), ref: 004055FA
                        • Part of subcall function 0040559F: SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                      • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402114
                      • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                      • String ID:
                      • API String ID: 334405425-0
                      • Opcode ID: 0812a69665cf11e377adb3684f8a171474585e26745252b9346dd4e1bc3f05c7
                      • Instruction ID: d1cf9917c249e547a3b1759614bc69e8b445b1996c4dbd71fd6f6dd46acd7470
                      • Opcode Fuzzy Hash: 0812a69665cf11e377adb3684f8a171474585e26745252b9346dd4e1bc3f05c7
                      • Instruction Fuzzy Hash: 2A21C231904104FACF11AFA5CE48A9D7A71BF48358F20413BF605B91E1DBBD8A82965D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GlobalFree.KERNEL32(00000000), ref: 00401C0B
                      • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C1D
                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(Call,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$AllocFreelstrcatlstrlen
                      • String ID: Call
                      • API String ID: 3292104215-1824292864
                      • Opcode ID: 20657af44ed66b5376e79003540324fbabe72067cc9bff9786e92576e1ce63f1
                      • Instruction ID: 7c0f58a685d1fc6dd3685da305ee1819882fb4420ac17dc2787245939102450a
                      • Opcode Fuzzy Hash: 20657af44ed66b5376e79003540324fbabe72067cc9bff9786e92576e1ce63f1
                      • Instruction Fuzzy Hash: 1B21D872904210EBDB20AFA8EE84A5E73B4EB04715755063BF552F72D0D7B8AC414B9D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E4
                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsfA826.tmp,00000000,00000011,00000002), ref: 004025FD
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Enum$CloseValue
                      • String ID:
                      • API String ID: 397863658-0
                      • Opcode ID: 2ceb002e910c094db02aea1c2c62d66cc74a7b046aa56edd155f21af9fce9564
                      • Instruction ID: 08080f496e1fbaad801da7c4a2f11cdf7a22a5a493a276a89d416976773fa01e
                      • Opcode Fuzzy Hash: 2ceb002e910c094db02aea1c2c62d66cc74a7b046aa56edd155f21af9fce9564
                      • Instruction Fuzzy Hash: 89017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61C0EBB85E44966D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 6E381BFF: GlobalFree.KERNEL32(?), ref: 6E381E74
                        • Part of subcall function 6E381BFF: GlobalFree.KERNEL32(?), ref: 6E381E79
                        • Part of subcall function 6E381BFF: GlobalFree.KERNEL32(?), ref: 6E381E7E
                      • CloseHandle.KERNELBASE(00000000), ref: 6E3817DC
                        • Part of subcall function 6E381312: GlobalAlloc.KERNEL32(00000040,?,?,6E3815FE,?), ref: 6E381328
                        • Part of subcall function 6E381312: lstrcpynW.KERNEL32(00000004,?,?,6E3815FE,?), ref: 6E38133E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$Free$AllocCloseHandlelstrcpyn
                      • String ID:
                      • API String ID: 363591596-0
                      • Opcode ID: 73411b4edc760fddc7b4f5cd6fd67d2d76ae496efd5e241144e79a8d06926436
                      • Instruction ID: 8769846bdf9f52a9dfc5ee12c264ee58e23257918ce24dd0d22f4b5a9a81e611
                      • Opcode Fuzzy Hash: 73411b4edc760fddc7b4f5cd6fd67d2d76ae496efd5e241144e79a8d06926436
                      • Instruction Fuzzy Hash: 9201C4B2408740ABCA909BF4D805BCB37ECAF42318F240C9AF5F596144DB75944CCBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsfA826.tmp,00000000,00000011,00000002), ref: 004025FD
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CloseQueryValue
                      • String ID:
                      • API String ID: 3356406503-0
                      • Opcode ID: dd1b1b3d94faa584660aa564dd852358c6c0cbefcfc3417a0db06bb84b323ca4
                      • Instruction ID: 3e5dab0bbcc9b7b4348569693e39c51bc0b27c59e8ea0ed6abb05ebc10b9b344
                      • Opcode Fuzzy Hash: dd1b1b3d94faa584660aa564dd852358c6c0cbefcfc3417a0db06bb84b323ca4
                      • Instruction Fuzzy Hash: 5F116D71900219EADF14DFA4DA589AE77B4FF04345B20443BE401B62C0E7B88A45EB5D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                      • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                      • Instruction ID: f98c5e72cab4da6dd47fcf147c12dc0649e5852bd482257a86ca63d172a8b8d6
                      • Opcode Fuzzy Hash: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                      • Instruction Fuzzy Hash: 0B01F4316202209FE7094B389D05B6A3698E710319F14823FF851F65F1EA78DC029B4C
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                        • Part of subcall function 0040689A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                        • Part of subcall function 0040689A: wsprintfW.USER32 ref: 004068EC
                        • Part of subcall function 0040689A: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406900
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                      • String ID:
                      • API String ID: 2547128583-0
                      • Opcode ID: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                      • Instruction ID: 98bdf7d71c6046f852b78b75196177710d0a141037308efd39b2ac7baa162fea
                      • Opcode Fuzzy Hash: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                      • Instruction Fuzzy Hash: 9FE0867390422066D21196745D44D7773A89B99750306443EF946F2090DB38DC31A76E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: File$AttributesCreate
                      • String ID:
                      • API String ID: 415043291-0
                      • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                      • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                      • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                      • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateDirectoryW.KERNELBASE(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                      • GetLastError.KERNEL32 ref: 00405AFF
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CreateDirectoryErrorLast
                      • String ID:
                      • API String ID: 1375471231-0
                      • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                      • Instruction ID: 33feed20cbbf131019f18849f7ccc9358209a8d33535326e0157453b6049084a
                      • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                      • Instruction Fuzzy Hash: 1BC04C30204501AED6105B609E48B177AA4DB50741F16843D6146E41E0DA789455EE2D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: _open
                      • String ID:
                      • API String ID: 4183159743-0
                      • Opcode ID: 0cdb6bb35f8dadfa68e5a916ff23262c27207633486112a1320575fcb30bc205
                      • Instruction ID: 75b7130d6ef1a67dfecbc95c6919c12ceeccc66f79cccca24f60fac600761ac4
                      • Opcode Fuzzy Hash: 0cdb6bb35f8dadfa68e5a916ff23262c27207633486112a1320575fcb30bc205
                      • Instruction Fuzzy Hash: F9418DF1904604EFDF119FE4DA94B9B3BBCEB46318F308866E8069B210DB399585DB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028AF
                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: FilePointerwsprintf
                      • String ID:
                      • API String ID: 327478801-0
                      • Opcode ID: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                      • Instruction ID: a13d1cf18dcce6f7d85bed0b4e0fde0de6b16079219dfacd376ffc086bc6f252
                      • Opcode Fuzzy Hash: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                      • Instruction Fuzzy Hash: D3E09271A04105BFDB01EFA5AE499AEB3B8EF44319B10483BF102F00C1DA794D119B2D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 00406401
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                      • Instruction ID: ccab944935cfefb85f0e849ce69279fb55db75a3b7fb0960311cd9d36817041a
                      • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                      • Instruction Fuzzy Hash: 04E0E6B2010109BFEF095F90DC0AD7B3B1DE704300F01892EFD06D4091E6B5AD306675
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403498,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 004060F3
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                      • Instruction ID: d8d859634201a592f38c73999a999f352708a9e59580de02994c407fa40ca669
                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                      • Instruction Fuzzy Hash: FAE08C3220026AABEF109E60DC04AEB3B6CFB00360F014837FA16E7081E270E93087A4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E2,00000000,00000000,00403306,000000FF,00000004,00000000,00000000,00000000), ref: 004060C4
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                      • Instruction ID: 1583d2e05e1cff28e3594e7db3f0db2d88eef65457287744bb544c492d9958e5
                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                      • Instruction Fuzzy Hash: AEE0EC322502AAABDF10AE65DC04AEB7B6CEB05361F018936FD16E6150E631E92197A4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VirtualProtect.KERNELBASE(6E38505C,00000004,00000040,6E38504C), ref: 6E382A9D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 7a321917f6fbe9b7489e851fa09de97825b5a6ef23e48898dac3dfc1c54a8ad4
                      • Instruction ID: bc1bed222e6c36cd4181c3f78e7f996281b4f51928f7b4bbad402b8960847a2d
                      • Opcode Fuzzy Hash: 7a321917f6fbe9b7489e851fa09de97825b5a6ef23e48898dac3dfc1c54a8ad4
                      • Instruction Fuzzy Hash: AAF0C9F0505B80FECB50CF78844470B3FE8B74B305B3445EAE14AEA240E3344544DB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402425
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: PrivateProfileString
                      • String ID:
                      • API String ID: 1096422788-0
                      • Opcode ID: 7d71ac8ddd31db18f378b319f763d6172168bca54096192b0f97eaa7b6b6bd09
                      • Instruction ID: 209997e2e20356d43fdb77e3237b303e11e03b8f2c16ee2f2baf27e4b220ec87
                      • Opcode Fuzzy Hash: 7d71ac8ddd31db18f378b319f763d6172168bca54096192b0f97eaa7b6b6bd09
                      • Instruction Fuzzy Hash: 05E01A30C00229FADB10AFA0CD09EAD3668BF41340F14052AF510AA0D1E7F889409789
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,0042C248,?,?,00406438,0042C248,00000000,?,?,Call,?), ref: 004063CE
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                      • Instruction ID: 4361357c0318622cec318f667d88df30c4c29b75262f7bca7234b06b46464da2
                      • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                      • Instruction Fuzzy Hash: 83D0123210020EBBDF115F91AD01FAB3B5DAB08310F014426FE06E40A1D775D530A764
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: 30328d7073751e656d59c65da3bf6c6accfc47a5a9bf7eee50ca0d6ba827389c
                      • Instruction ID: 33d43a8ddb5fee1851102b8e64c9f064c627007e01bf6cdc746e786b0f5045d9
                      • Opcode Fuzzy Hash: 30328d7073751e656d59c65da3bf6c6accfc47a5a9bf7eee50ca0d6ba827389c
                      • Instruction Fuzzy Hash: 30D01772B08110DBDB11DBA8AA48B9D72A4AB50368B208537D111F61D0E6B8C945AA19
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ShellExecuteExW.SHELL32(?), ref: 00405B72
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: ExecuteShell
                      • String ID:
                      • API String ID: 587946157-0
                      • Opcode ID: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                      • Instruction ID: 155326c85e208380d9db810c36285a9e1b4200be200639c8195ffcf147e959ee
                      • Opcode Fuzzy Hash: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                      • Instruction Fuzzy Hash: BEC092B2000200EFE301CF80CB09F067BE8AF54306F028068E185DA060C7788840CB29
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                      • Instruction ID: f9270ce27bc2d5d500308faa7c43699bdd9cec228278350af1c7ef3a72e6c056
                      • Opcode Fuzzy Hash: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                      • Instruction Fuzzy Hash: 4FB01235181A00FBDE514B00DE09F857E62F7E4701F058038F341240F0CBB200A4DB08
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040387D,?), ref: 004034F3
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GlobalAlloc.KERNELBASE(00000040,?,6E3812DB,?,6E38137F,00000019,6E3811CA,-000000A0), ref: 6E3812C5
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: AllocGlobal
                      • String ID:
                      • API String ID: 3761449716-0
                      • Opcode ID: 7b8db7491ef775b3b83dd34f3f43316a49b05fe59e5264a0e7eb5f20170df757
                      • Instruction ID: 0366e580d633a09134fc46ab5f80c5361d58f706cabf06e449426f6966c90584
                      • Opcode Fuzzy Hash: 7b8db7491ef775b3b83dd34f3f43316a49b05fe59e5264a0e7eb5f20170df757
                      • Instruction Fuzzy Hash: B4B012F0A00500EFEE008B74CC06F37369CE703301F144080F601C0180C1204C00C636
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDlgItem.USER32(?,00000403), ref: 0040573C
                      • GetDlgItem.USER32(?,000003EE), ref: 0040574B
                      • GetClientRect.USER32(?,?), ref: 00405788
                      • GetSystemMetrics.USER32(00000002), ref: 0040578F
                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B0
                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C1
                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D4
                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E2
                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057F5
                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405817
                      • ShowWindow.USER32(?,00000008), ref: 0040582B
                      • GetDlgItem.USER32(?,000003EC), ref: 0040584C
                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040585C
                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405875
                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405881
                      • GetDlgItem.USER32(?,000003F8), ref: 0040575A
                        • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                      • GetDlgItem.USER32(?,000003EC), ref: 0040589E
                      • CreateThread.KERNEL32(00000000,00000000,Function_00005672,00000000), ref: 004058AC
                      • CloseHandle.KERNEL32(00000000), ref: 004058B3
                      • ShowWindow.USER32(00000000), ref: 004058D7
                      • ShowWindow.USER32(00000000,00000008), ref: 004058DC
                      • ShowWindow.USER32(00000008), ref: 00405926
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595A
                      • CreatePopupMenu.USER32 ref: 0040596B
                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040597F
                      • GetWindowRect.USER32(?,?), ref: 0040599F
                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059B8
                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F0
                      • OpenClipboard.USER32(00000000), ref: 00405A00
                      • EmptyClipboard.USER32 ref: 00405A06
                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A12
                      • GlobalLock.KERNEL32(00000000), ref: 00405A1C
                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A30
                      • GlobalUnlock.KERNEL32(00000000), ref: 00405A50
                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405A5B
                      • CloseClipboard.USER32 ref: 00405A61
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                      • String ID: {
                      • API String ID: 590372296-366298937
                      • Opcode ID: 0351a4ae9caadcbf2361a84da16871a77460ca2c3601ac0547f74b8735fc1ac2
                      • Instruction ID: 6b97441d6f4cfe62a880681573964a63c423f2dd70b2063085686802d9cc5617
                      • Opcode Fuzzy Hash: 0351a4ae9caadcbf2361a84da16871a77460ca2c3601ac0547f74b8735fc1ac2
                      • Instruction Fuzzy Hash: C8B169B1900608FFDB119FA0DD85AAE7B79FB44355F00803AFA41BA1A0C7755E51DF58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDlgItem.USER32(?,000003FB), ref: 004049D9
                      • SetWindowTextW.USER32(00000000,?), ref: 00404A03
                      • SHBrowseForFolderW.SHELL32(?), ref: 00404AB4
                      • CoTaskMemFree.OLE32(00000000), ref: 00404ABF
                      • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 00404AF1
                      • lstrcatW.KERNEL32(?,Call), ref: 00404AFD
                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B0F
                        • Part of subcall function 00405B81: GetDlgItemTextW.USER32(?,?,00000400,00404B46), ref: 00405B94
                        • Part of subcall function 004067C4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                        • Part of subcall function 004067C4: CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                        • Part of subcall function 004067C4: CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                        • Part of subcall function 004067C4: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                      • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 00404BD2
                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BED
                        • Part of subcall function 00404D46: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                        • Part of subcall function 00404D46: wsprintfW.USER32 ref: 00404DF0
                        • Part of subcall function 00404D46: SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                      • String ID: A$C:\Users\user\AppData\Local\Temp\codette\darning$Call$rJR
                      • API String ID: 2624150263-2982040852
                      • Opcode ID: b8cdebab61bdee671a64d6391d856ccc2d8be25e437da08240289bd4e184518b
                      • Instruction ID: a81e8b8b6ddc8ea4f7a7a45a10ce21cc850824e22f7b82fba9ad49fead82d7d1
                      • Opcode Fuzzy Hash: b8cdebab61bdee671a64d6391d856ccc2d8be25e437da08240289bd4e184518b
                      • Instruction Fuzzy Hash: CBA191B1900208ABDB119FA6DD45AAFB7B8EF84314F10803BF601B62D1D77C9A41CB6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 6E3812BB: GlobalAlloc.KERNELBASE(00000040,?,6E3812DB,?,6E38137F,00000019,6E3811CA,-000000A0), ref: 6E3812C5
                      • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6E381D2D
                      • lstrcpyW.KERNEL32(00000008,?), ref: 6E381D75
                      • lstrcpyW.KERNEL32(00000808,?), ref: 6E381D7F
                      • GlobalFree.KERNEL32(00000000), ref: 6E381D92
                      • GlobalFree.KERNEL32(?), ref: 6E381E74
                      • GlobalFree.KERNEL32(?), ref: 6E381E79
                      • GlobalFree.KERNEL32(?), ref: 6E381E7E
                      • GlobalFree.KERNEL32(00000000), ref: 6E382068
                      • lstrcpyW.KERNEL32(?,?), ref: 6E382222
                      • GetModuleHandleW.KERNEL32(00000008), ref: 6E3822A1
                      • LoadLibraryW.KERNEL32(00000008), ref: 6E3822B2
                      • GetProcAddress.KERNEL32(?,?), ref: 6E38230C
                      • lstrlenW.KERNEL32(00000808), ref: 6E382326
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                      • String ID:
                      • API String ID: 245916457-0
                      • Opcode ID: 1f0d37b2c0437eab7985899cf2dc3a353b9f5aef1ae1e3a74bda194cb88a23c0
                      • Instruction ID: 6d0c40c4925daf33bd1d6cba2cf66ab5f8d3de177c29053d362e3497d4687334
                      • Opcode Fuzzy Hash: 1f0d37b2c0437eab7985899cf2dc3a353b9f5aef1ae1e3a74bda194cb88a23c0
                      • Instruction Fuzzy Hash: 68228A71D1460ADEDB508FE9C5906EFB7F8FB05305F20462AD1B5E7280D7B19A89CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                      Strings
                      • C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes, xrefs: 00402269
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CreateInstance
                      • String ID: C:\Users\user\AppData\Local\Temp\codette\darning\bisonen\Grafikskrmenes
                      • API String ID: 542301482-3686705221
                      • Opcode ID: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                      • Instruction ID: 5977cb51530078b600b156af0050786de557c4b464dd586e6a5beaa7a0440451
                      • Opcode Fuzzy Hash: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                      • Instruction Fuzzy Hash: A7411571A00208EFCF40DFE4C989E9D7BB5BF49348B20456AF905EB2D1DB799981CB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: FileFindFirst
                      • String ID:
                      • API String ID: 1974802433-0
                      • Opcode ID: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                      • Instruction ID: 3f6fbcf0fd4d311cdd608d5f72697756ed96b8559223cd5d9f1c4d92bc61f1b3
                      • Opcode Fuzzy Hash: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                      • Instruction Fuzzy Hash: 3CF08271A04105EFD701DBA4ED49AAEB378FF14314F60417BE116F21D0E7B88E159B29
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                      • Instruction ID: 3db1d01f4341fbbb805040525b4c18df43ce82c239752998d09602440244d977
                      • Opcode Fuzzy Hash: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                      • Instruction Fuzzy Hash: FEE18A71A0070ADFCB24CF59D880BAABBF5FB44305F15852EE496A72D1D338AA91CF45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                      • Instruction ID: 4d3fc1c80ea15bf86cc2801d6424e98614acddb7a54358772128df9d71e60e61
                      • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                      • Instruction Fuzzy Hash: C6C14871E042599BCF18CF68C8905EEBBB2BF88314F25866AD85677380D7347941CF95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046F6
                      • GetDlgItem.USER32(?,000003E8), ref: 0040470A
                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404727
                      • GetSysColor.USER32(?), ref: 00404738
                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404746
                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404754
                      • lstrlenW.KERNEL32(?), ref: 00404759
                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404766
                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040477B
                      • GetDlgItem.USER32(?,0000040A), ref: 004047D4
                      • SendMessageW.USER32(00000000), ref: 004047DB
                      • GetDlgItem.USER32(?,000003E8), ref: 00404806
                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404849
                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404857
                      • SetCursor.USER32(00000000), ref: 0040485A
                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404873
                      • SetCursor.USER32(00000000), ref: 00404876
                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048A5
                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                      • String ID: Call$N$rJR
                      • API String ID: 3103080414-2590335071
                      • Opcode ID: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                      • Instruction ID: e0aa441e67ff77812dea5cfa76c138b5706349c0d06c8e95e02877fce1cb63d1
                      • Opcode Fuzzy Hash: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                      • Instruction Fuzzy Hash: 1A61A3B5900209BFDB10AF60DD85E6A7BA9FB44314F00843AFB05B62D0D778A951DF98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                      • BeginPaint.USER32(?,?), ref: 00401047
                      • GetClientRect.USER32(?,?), ref: 0040105B
                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                      • DeleteObject.GDI32(?), ref: 004010ED
                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                      • SelectObject.GDI32(00000000,?), ref: 00401140
                      • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                      • DeleteObject.GDI32(?), ref: 00401165
                      • EndPaint.USER32(?,?), ref: 0040116E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                      • String ID: F
                      • API String ID: 941294808-1304234792
                      • Opcode ID: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                      • Instruction ID: e457e53e67a16f607b198c8be77aa7e47a8fd9e6aa67a1a07366d16d1d2d9a76
                      • Opcode Fuzzy Hash: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                      • Instruction Fuzzy Hash: 0E418B71800209AFCF058FA5DE459AF7FB9FF44315F04802AF991AA1A0C738AA55DFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040631E,?,?), ref: 004061BE
                      • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061C7
                        • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                        • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                      • GetShortPathNameW.KERNEL32(?,00431108,00000400), ref: 004061E4
                      • wsprintfA.USER32 ref: 00406202
                      • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 0040623D
                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040624C
                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406284
                      • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DA
                      • GlobalFree.KERNEL32(00000000), ref: 004062EB
                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F2
                        • Part of subcall function 0040602D: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                        • Part of subcall function 0040602D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                      • String ID: %ls=%ls$[Rename]
                      • API String ID: 2171350718-461813615
                      • Opcode ID: af54a0d72cb6452c7328d616a7d81a2116b93f7a1ceac1577c6fc99eaa574dc1
                      • Instruction ID: 71978d88b6039f89b25a0dfa2ffa892efa56fbf884cfe692307f7793e751c739
                      • Opcode Fuzzy Hash: af54a0d72cb6452c7328d616a7d81a2116b93f7a1ceac1577c6fc99eaa574dc1
                      • Instruction Fuzzy Hash: 6A314670200716BBD2207B659D48F6B3A6CEF45754F15017EFA42F62C2EA3CA821867D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetWindowLongW.USER32(?,000000EB), ref: 0040451D
                      • GetSysColor.USER32(00000000), ref: 0040455B
                      • SetTextColor.GDI32(?,00000000), ref: 00404567
                      • SetBkMode.GDI32(?,?), ref: 00404573
                      • GetSysColor.USER32(?), ref: 00404586
                      • SetBkColor.GDI32(?,?), ref: 00404596
                      • DeleteObject.GDI32(?), ref: 004045B0
                      • CreateBrushIndirect.GDI32(?), ref: 004045BA
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                      • String ID:
                      • API String ID: 2320649405-0
                      • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                      • Instruction ID: 19446832cb8519ea1938040ed984131457e28e93d0b00b9b4dc42373f0e33a15
                      • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                      • Instruction Fuzzy Hash: 382177B1500705AFCB31DF68DD08B5BBBF8AF41714B058A2EEA96B22E1C734E944CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • lstrlenW.KERNEL32(0042C248,00000000,00425A20,759223A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                      • lstrlenW.KERNEL32(00403418,0042C248,00000000,00425A20,759223A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                      • lstrcatW.KERNEL32(0042C248,00403418), ref: 004055FA
                      • SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(Call,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: MessageSendlstrlen$lstrcat$TextWindow
                      • String ID:
                      • API String ID: 1495540970-0
                      • Opcode ID: d546c9872a312bcfa6da78a885f9e0cd63443b9c4f2972b876eb027fb943b796
                      • Instruction ID: 138a2a903332092674924c4fce2a37a83712bc812e9b86ab44911e1df8857bb6
                      • Opcode Fuzzy Hash: d546c9872a312bcfa6da78a885f9e0cd63443b9c4f2972b876eb027fb943b796
                      • Instruction Fuzzy Hash: C1219071900558BACF11AFA9DD84DDFBF75EF45354F14803AF904B22A0C7794A419F68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                      • CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                      • CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                      • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Char$Next$Prev
                      • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                      • API String ID: 589700163-1201062745
                      • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                      • Instruction ID: 8e05d213a2b26a47bd0c986db1e6a85e10b5e067f284fb5e9645f7af11a9ce3c
                      • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                      • Instruction Fuzzy Hash: 7311862780161295DB313B158C44A77A2A8AF58798F56843FED86B32C1E77C8C9282AD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E6F
                      • GetMessagePos.USER32 ref: 00404E77
                      • ScreenToClient.USER32(?,?), ref: 00404E91
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EA3
                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Message$Send$ClientScreen
                      • String ID: f
                      • API String ID: 41195575-1993550816
                      • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                      • Instruction ID: 177f1d0b32132a6560496663958852c5fe6f1b23f9da62007dee57caca3d7f28
                      • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                      • Instruction Fuzzy Hash: 34014C71900219BADB00DBA4DD85BFFBBB8AB54711F10012BBA50B61C0D7B49A058BA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDC.USER32(?), ref: 00401E51
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                      • ReleaseDC.USER32(?,00000000), ref: 00401E84
                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(Call,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                      • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                      • String ID: Tahoma
                      • API String ID: 2584051700-3580928618
                      • Opcode ID: 5a307c57abaa750ab7baf3a9c2551cf6eeaa27c438895effeb0227a977055345
                      • Instruction ID: 78b13ae86a0973dc2b43aa2eb6c1af0beb3c1ef463c522f55250376beecb9f8a
                      • Opcode Fuzzy Hash: 5a307c57abaa750ab7baf3a9c2551cf6eeaa27c438895effeb0227a977055345
                      • Instruction Fuzzy Hash: 7001B571904241EFEB005BB0EE49B9A3FB4BB15301F108A39F541B71D2C7B904458BED
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                      • MulDiv.KERNEL32(000BC509,00000064,?), ref: 00402FDC
                      • wsprintfW.USER32 ref: 00402FEC
                      • SetWindowTextW.USER32(?,?), ref: 00402FFC
                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                      Strings
                      • verifying installer: %d%%, xrefs: 00402FE6
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Text$ItemTimerWindowwsprintf
                      • String ID: verifying installer: %d%%
                      • API String ID: 1451636040-82062127
                      • Opcode ID: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                      • Instruction ID: eb17ebabde20c32bd565f0ca98bf5c3c7f8a04474e671541d9d17dad0456e96b
                      • Opcode Fuzzy Hash: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                      • Instruction Fuzzy Hash: 20014B7064020DABEF209F60DE4AFEA3B79FB04345F008039FA06B51D0DBB999559F69
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 6E3812BB: GlobalAlloc.KERNELBASE(00000040,?,6E3812DB,?,6E38137F,00000019,6E3811CA,-000000A0), ref: 6E3812C5
                      • GlobalFree.KERNEL32(?), ref: 6E382743
                      • GlobalFree.KERNEL32(00000000), ref: 6E382778
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$Free$Alloc
                      • String ID:
                      • API String ID: 1780285237-0
                      • Opcode ID: bef36d67ea8c6a41a7448dc4432ad9c709dfc1f2a1eb21b9b973bafbf8bb4262
                      • Instruction ID: f5f8d29e4391fb4cae5f315c1a0da88d5f9e46d2a95039826e6d7ac387da7c54
                      • Opcode Fuzzy Hash: bef36d67ea8c6a41a7448dc4432ad9c709dfc1f2a1eb21b9b973bafbf8bb4262
                      • Instruction Fuzzy Hash: AB31C2B1504501EFCB158FE6CE84C6BBBBEFB873447244569F18297611D7725806CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                      • GlobalFree.KERNEL32(?), ref: 00402A06
                      • GlobalFree.KERNEL32(00000000), ref: 00402A19
                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                      • String ID:
                      • API String ID: 2667972263-0
                      • Opcode ID: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                      • Instruction ID: 8fc1a79e9ee36ebd610a2d663d7387b5f1fea8f48d7bc9e01940cd119f3fb53c
                      • Opcode Fuzzy Hash: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                      • Instruction Fuzzy Hash: 5831C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E0CB794C429BA8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: FreeGlobal
                      • String ID:
                      • API String ID: 2979337801-0
                      • Opcode ID: e7c5a4f67687b638fb1f4fdf184a13d40606b628e2381f7b8e43b2e1155fc587
                      • Instruction ID: 6b1aff01e2a3cd532aa31e741dc994392e0c1c38206f4fb366e194eb35df0f6d
                      • Opcode Fuzzy Hash: e7c5a4f67687b638fb1f4fdf184a13d40606b628e2381f7b8e43b2e1155fc587
                      • Instruction Fuzzy Hash: F351EF72D14109AECB529FF9C8406EFBBBDEB45304F10855AD434B3218E776AA8DC7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GlobalFree.KERNEL32(00000000), ref: 6E3825C2
                        • Part of subcall function 6E3812CC: lstrcpynW.KERNEL32(00000000,?,6E38137F,00000019,6E3811CA,-000000A0), ref: 6E3812DC
                      • GlobalAlloc.KERNEL32(00000040), ref: 6E382548
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E382563
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                      • String ID:
                      • API String ID: 4216380887-0
                      • Opcode ID: 693845d2caf61968c292aa5662897745d8d3b73e05c55e984aa43f0197aee8f6
                      • Instruction ID: 0a9896124ac91102855af838db4d8249816ba0ef41081e8f8b85956f5058e652
                      • Opcode Fuzzy Hash: 693845d2caf61968c292aa5662897745d8d3b73e05c55e984aa43f0197aee8f6
                      • Instruction Fuzzy Hash: 9941FFB0048705EFDB14DFA9D940A67B7FCFB86310F10895EE49687580EB31A549CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CloseEnum$DeleteValue
                      • String ID:
                      • API String ID: 1354259210-0
                      • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                      • Instruction ID: ca6229ec891c5908b4c2d3bab14ae3db7b9396451d72a40731f1c02386a45f13
                      • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                      • Instruction Fuzzy Hash: DA215A7150010ABBEF119F90CE89EEF7B7DEB50384F100076F909B21A0D7B49E54AA68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetDlgItem.USER32(?,?), ref: 00401D9A
                      • GetClientRect.USER32(?,?), ref: 00401DE5
                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                      • DeleteObject.GDI32(00000000), ref: 00401E39
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                      • String ID:
                      • API String ID: 1849352358-0
                      • Opcode ID: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                      • Instruction ID: b69f8f45c5cbb28dd5603d9b1d667d2ce3d3910c133b75fee4ecc707c572ca23
                      • Opcode Fuzzy Hash: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                      • Instruction Fuzzy Hash: 3321F672904119AFCB05DBA4DE45AEEBBB5EF08314F14003AFA45F62A0DB389951DB98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E3822D8,?,00000808), ref: 6E3816D5
                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6E3822D8,?,00000808), ref: 6E3816DC
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E3822D8,?,00000808), ref: 6E3816F0
                      • GetProcAddress.KERNEL32(6E3822D8,00000000), ref: 6E3816F7
                      • GlobalFree.KERNEL32(00000000), ref: 6E381700
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                      • String ID:
                      • API String ID: 1148316912-0
                      • Opcode ID: 0e7560a92a9dca164e321cb4a6b9adbbf0941fa8c2ce4421048597a4adf5fc6a
                      • Instruction ID: 96a7a95a6e98cb9357d57633d48d5978878fc86780cf41b8fa20ad1c7a1d6ece
                      • Opcode Fuzzy Hash: 0e7560a92a9dca164e321cb4a6b9adbbf0941fa8c2ce4421048597a4adf5fc6a
                      • Instruction Fuzzy Hash: 43F0C0B22065387FDA2116A78C4CC9BBE9CDF8B2F5B210355F728D2590C6615D02D7F1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                      • wsprintfW.USER32 ref: 00404DF0
                      • SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: ItemTextlstrlenwsprintf
                      • String ID: %u.%u%s%s
                      • API String ID: 3540041739-3551169577
                      • Opcode ID: f25a22526785446c688fd3f52d2f22fd658500e716035f037fc18e3e72b8c718
                      • Instruction ID: d7f2b51e3f2153b105aad6c1cbcae815e44f670c765de83d30fbb221df5484fa
                      • Opcode Fuzzy Hash: f25a22526785446c688fd3f52d2f22fd658500e716035f037fc18e3e72b8c718
                      • Instruction Fuzzy Hash: AC11D573A041283BDB10656DAC45E9E369CAF81334F254237FA66F21D1EA78D91182E8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E12
                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E1C
                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405E2E
                      Strings
                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E0C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CharPrevlstrcatlstrlen
                      • String ID: C:\Users\user\AppData\Local\Temp\
                      • API String ID: 2659869361-823278215
                      • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                      • Instruction ID: 1a595bf39a0a3392b99637bd72bd9cca8666c17676e511d5d4bf90e80f698eee
                      • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                      • Instruction Fuzzy Hash: A8D0A731101930BAC2127B49EC08DDF62ACAE89340341443BF145B30A4CB7C5E5187FD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6E381171
                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6E3811E3
                      • GlobalFree.KERNEL32 ref: 6E38124A
                      • GlobalFree.KERNEL32(?), ref: 6E38129B
                      • GlobalFree.KERNEL32(00000000), ref: 6E3812B1
                      Memory Dump Source
                      • Source File: 00000000.00000002.4467939401.000000006E381000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E380000, based on PE: true
                      • Associated: 00000000.00000002.4467881447.000000006E380000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4467991886.000000006E384000.00000002.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000000.00000002.4468025798.000000006E386000.00000002.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6e380000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Global$Free$Alloc
                      • String ID:
                      • API String ID: 1780285237-0
                      • Opcode ID: 9940de8941adcf40d5f5218f018da555834212f6bf5135ea5edbd9c5d511a082
                      • Instruction ID: 721044479d426808ec386b06d958d473fd7df4047549425c218d8bb13e630247
                      • Opcode Fuzzy Hash: 9940de8941adcf40d5f5218f018da555834212f6bf5135ea5edbd9c5d511a082
                      • Instruction Fuzzy Hash: 2D518CB5900602EFDB44CFA8C844A6777ECFB0B319B204559F965DB210E736ED08CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsfA826.tmp\System.dll), ref: 00402695
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: lstrlen
                      • String ID: C:\Users\user\AppData\Local\Temp\nsfA826.tmp$C:\Users\user\AppData\Local\Temp\nsfA826.tmp\System.dll
                      • API String ID: 1659193697-930545174
                      • Opcode ID: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                      • Instruction ID: edf8e5a6553ae7ef136857fb61bcac29e22bbc78049b19fa22ca3c34260198f3
                      • Opcode Fuzzy Hash: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                      • Instruction Fuzzy Hash: 2611EB71A00215BBCB10BFB18E4AAAE7665AF40744F25443FE002B71C2EAFC8891565E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DestroyWindow.USER32(?,00000000,004031F7,00000001,?,?,?,?,?,0040387D,?), ref: 0040302C
                      • GetTickCount.KERNEL32 ref: 0040304A
                      • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040387D,?), ref: 00403075
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                      • String ID:
                      • API String ID: 2102729457-0
                      • Opcode ID: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                      • Instruction ID: 3364d2369d767f53e7c05e99e54cbc9c067443d5da9c9f227d7c3a258cba7bb7
                      • Opcode Fuzzy Hash: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                      • Instruction Fuzzy Hash: A9F08270702A20AFC2316F50FE4998B7F68FB44B56741447AF446B15ACCB380DA2CB9D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                        • Part of subcall function 00405EB7: CharNextW.USER32(?,?,0042FA70,?,00405F2B,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                      • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F6D
                      • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405F7D
                      Strings
                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F14
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                      • String ID: C:\Users\user\AppData\Local\Temp\
                      • API String ID: 3248276644-823278215
                      • Opcode ID: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                      • Instruction ID: e20fb510edeaf32ba19235dad054e15b0ffac27cf679254cac4fdbc394554759
                      • Opcode Fuzzy Hash: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                      • Instruction Fuzzy Hash: E3F0F426119D6226DB22333A5C05EAF0554CE9276475A023BF895B12C5DB3C8A43D8AE
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,00403B2F,00403A5E,?), ref: 00403B71
                      • GlobalFree.KERNEL32(?), ref: 00403B78
                      Strings
                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B57
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: Free$GlobalLibrary
                      • String ID: C:\Users\user\AppData\Local\Temp\
                      • API String ID: 1100898210-823278215
                      • Opcode ID: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                      • Instruction ID: 19c5699a9bb8b3376c06320bd1355d3f7d45777e2bc9a3354ca833756e7661a4
                      • Opcode Fuzzy Hash: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                      • Instruction Fuzzy Hash: 40E0EC3290212097C7615F55FE08B6E7B78AF49B26F05056AE884BB2628B746D428BDC
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00405E5E
                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,C:\Users\user\Desktop\rCOTA____OMAGNA.exe,80000000,00000003), ref: 00405E6E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: CharPrevlstrlen
                      • String ID: C:\Users\user\Desktop
                      • API String ID: 2709904686-1246513382
                      • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                      • Instruction ID: d2786f61c86b799b8b6ecf14661ff9643eaf9d362a95097130d0805b1e4d2bc4
                      • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                      • Instruction Fuzzy Hash: 36D0A7B3410D20DAC3126718DC04DAF73ECFF6134074A442AF481A71A4D7785E8186ED
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBA
                      • CharNextA.USER32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                      • lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                      Memory Dump Source
                      • Source File: 00000000.00000002.4466014630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4465982982.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466052460.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000456000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466086168.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4466297886.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_rCOTA____OMAGNA.jbxd
                      Similarity
                      • API ID: lstrlen$CharNextlstrcmpi
                      • String ID:
                      • API String ID: 190613189-0
                      • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                      • Instruction ID: bd09551308ad338638525116890fdadd4ab1f465f5503068af61de479685a4e4
                      • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                      • Instruction Fuzzy Hash: 34F0C231604418FFC7029BA5CD0099EBBA8EF06250B2140AAF840FB210D678DE019BA9
                      Uniqueness

                      Uniqueness Score: -1.00%